Coming from emails, SMS, messages from applications, users are susceptible to malware actions that are programs developed to invade, multiply and a...
Coming from emails, SMS, messages from applications, users are susceptible to malware actions that are programs developed to invade, multiply and affect programs, files, and other documents on the machine. Therefore, a lot of attention and caution is necessary. Popularly known as a 'Trojan horse', this virus aims to:
Create pop-up ads when connecting to the Internet. Trojan horses are programs used to identify unrepaired threats to initiate a new attack. Simulate offering something good to the user, but not delivering. They are malicious codes that do this to authorize the access of worms and rootkits. Attack their biggest targets, network services where they look for unrepaired threats such as worm and rootkit access. Be responsible for monitoring the network by duplicating packets. a. Create pop-up ads when connecting to the Internet. b. Trojan horses are programs used to identify unrepaired threats to initiate a new attack. c. Simulate offering something good to the user, but not delivering. They are malicious codes that do this to authorize the access of worms and rootkits. d. Attack their biggest targets, network services where they look for unrepaired threats such as worm and rootkit access. e. Be responsible for monitoring the network by duplicating packets.
A alternativa correta é a letra C: "Simular oferecer algo bom para o usuário, mas não entregar. Eles são códigos maliciosos que fazem isso para autorizar o acesso de worms e rootkits."
0
0
✏️ Responder
Para escrever sua resposta aqui, entre ou crie uma conta
Compartilhar