Why should users be cautious of hidden file extensions?
A) The files are usually executable.
B) They often are used to hide Trojan horses.
C) The wrong application is likely to open.
D) They make it difficult to establish file-application associations.
Correct Answer:
Verified
Q11: A Trojan horse application sometimes creates a
Q12: Which is spyware loaded from a Web
Q13: What is the best approach to preventing
Q14: Which is NOT a likely symptom of
Q15: What does adware do?
A)It creates popup advertising
Q17: Which Trojan horse is a small,self-installing remote
Q18: Which remote administration tool only operates on
Q19: What did the util-linux Trojan horse do
Q20: Why should downloads of files be restricted
Q21: _ is an anti-spyware program that provides
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents