Explain why a macro is a category of threat.
What will be an ideal response?
While many applications have a built-in macro language, this is a vulnerability that macro malware can exploit by using the macro language of an application to replicate and activate itself.
You might also like to view...
Which of the following formats will do a good job of compressing photographic images that will be included in banners on a Web page?
a. TIFF b. JPEG c. BMP d. all of the above
Live File System refers to data on a USB drive
Indicate whether the statement is true or false
When items are removed from a priority queue, items of lower priority are removed before those of higher priority.
Answer the following statement true (T) or false (F)
The Ctrl+A keyboard shortcut selects an entire _____.
A. document B. word C. line D. paragraph