Pieces of code that are executed after the virus or worm has spread are called ________.
A) vulnerabilities
B) exploits
C) compromises
D) payloads
E) All of the above.
Correct Answer:
Verified
Q22: Scripts are normally bad.
Q23: An attack in which an authentic-looking e-mail
Q24: A program that can capture passwords as
Q25: Which of the following tends to be
Q26: Malware programs that masquerade as system files
Q28: Unsolicited commercial e-mail is better known as
Q29: A Trojan horse that sorts through files
Q30: Trojan horses get onto computers by _.
A)viruses
B)hackers
C)Both
Q31: Tricking users into doing something against their
Q32: The general name for malware on a
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents