Aaron has started a food blog on which he wants to post his recipes.He wants to place a high-quality image next to each cooking step.Which file format should he use so that users do not experience a lag when loading the high-quality images on the website?
Sarah received an email that claimed to be from her bank. The email asked her to provide her password. Sarah later found out that the email was not from her bank and that she had given sensitive information to someone who gained access to her accounts. This is an example of a ____________.
A) worm B) trojan horse C) phishing attack D) denial of service attack
You are a computer programmer who feels short-changed by your organization. To get back at them, you would most likely use a Trojan horse, back door, or logic bomb.
What do you do with crashed mechanical hard drives that contain sensitive data from a government finance company?
A) Donate them to a local college or school B) Use a drive overwrite program,drill holes through the platters,and then use a hammer to further destroy the pieces C) Use a data vacuum D) Use the cipher command