answersLogoWhite

0


Best Answer

No / False

User Avatar

Wiki User

14y ago
This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: If What if your computer is compromised should You disconnect from the network perform a system backup reboot the system and contact the ACERT?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

What if your computer is compromised You should disconnect from the network, perform a system backup, reboot the system, and contact the ACERT?

False. Trackable information will be lost if you reboot.


What if your computer is compromised. You should disconnect from the network perform a system backup reboot the system and contact the ACERT true or false?

It's false.


How is botnet created?

A botnet is a collection of compromised computers connected to the Internet (each compromised computer is known as a 'bot'). When a computer is compromised by an attacker, there is often code within the malware that commands it to become part of a botnet. The "botmaster" or "bot herder" controls these compromised computers via standards based network protocols such as IRC and http.


How can I find out my computer's security network info?

To find out specific information about your computers network security you can contact your network admin


How Can You Reconnect The Internet On A Computer?

firstly click on the icon of network connection right bottom corner . it will show 2 options .1-connect or disconnect 2-network and sharing centre . click on connect or disconnect. from here u can easily operate your network connection.


What is the first thing you do when discover a computer is infected with malware?

Safest thing to do is to restart it in safe mode and use a malware removal program such as Spybot S&D to clean it, also run a virus scan just in case. Try to insure the computer remains off the internet as much as possible until it is cleaned as malware may be sending and receiving harmful or personal data.


Which type of network attack exploits vulnerabilities in the compromised system with the intent of propagating itself across a network?

worm


What is the drawback of using a MAC address?

Someone can spoof it using a MAC spoof attack. This is where an attack acquires your MAC address, sends a disconnect signal to your computer to disconnect you from the network, and then connects onto the network with your MAC address, making the network's authentication systems think it is you, but it is really a hacker. When you try to get back on, you find that you can't because the network won't allow two computers with the same MAC address to be connected on the network.


What do you need to do to make files available for use in Windows XP Professional when you disconnect from a network?

Configure your computer to cache versions of the files to your hard disk


How do you do study of computer network?

computer network


Is Network security is more often compromised from the inside than external sources?

True


What should be in a good computer network tutorial?

The components and guidelines in making a good computer network tutorial are the definitions of computer network tutorial, the basics of computer network tutorial and the other guidelines and specifics of computer network tutorials.