Worms typically require users to do something to get infected.

a. true
b. false


Answer: b. false

Computer Science & Information Technology

You might also like to view...

A client changing the values of private data members is:

a. Only possible by calling private member functions. b. Possible using public functions and references. c. Never possible. d. Only possible if the private variables are not declared inside the class.

Computer Science & Information Technology

Switched Ethernet divides the network into multiple ____________________.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

What are the two critical boot files that risk corruption in Windows?

A. bootmgr and bcd B. bootmgr and boot.ini C. bcd and mbr D. boot.ini and fixboot

Computer Science & Information Technology

Distinguish between security in SNMP V1 and security in SNMP V2

A. SNMP v1 and v2 have strong security. B. SNMP v1 had no security at all. SNMP v2 introduces community strings in which a shared secret between manager and managed devices was used to authenticate messages. C. SNMP v2 had no security at all. SNMP v1 introduces community strings in which a shared secret between manager and managed devices was used to authenticate messages. D. SNMP v1 and v2 had no security at all.

Computer Science & Information Technology