The network vehicle used for worm propagation is ___________.
A) electronic mail facility
B) remote execution capability
C) remote login capability
D) all of the above
Correct Answer:
Verified
Q18: A macro virus is a larger and
Q19: A stealth virus is explicitly designed to
Q20: One type of attack on the security
Q21: A loss of _ is the disruption
Q22: Which of the following statements is generally
Q24: _ involve some modification of the data
Q25: An example of _ is traffic analysis,in
Q26: _ capture keystrokes on a compromised system.
A)Worms
B)Zombies
C)Keyloggers
D)All
Q27: _ is the protection afforded to an
Q28: The stage of a virus where it
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents