2. Submitted
Security curriculum emphasizes core security
technologies, the installation, troubleshooting and
monitoring of network devices to maintain integrity,
confidentiality and availability of data and devices,
and competency in the technologies that uses in its
security structure.
5. A virus can only spread from one computer to another by:
Sending it over a network as a file or as an email payload.
Carrying it on a removable medium.
6. A pop-up programs :
A Trojan horse is a program that appears, to the user, to
perform a desirable function but, in fact, facilitates
unauthorized access to the user's computer system.
Hacker
It is a person who penetrates either destroyed or for the
money .
7. To make the protected network:
Filled firewall
Buy firewall device
Take a copy of your information
Install reliable programs
Continuously update for protection software