A ____ combines into one program the characteristics of other attacks.

A. Trojan Horse
B. worm
C. multi-thread virus
D. blended threat


Answer: D

Computer Science & Information Technology

You might also like to view...

The ________ process requires both hearing and thinking

Fill in the blank(s) with correct word

Computer Science & Information Technology

To have effective port monitoring and see all traffic on the network, which of the following needs to be configured?

A) STP B) Root bridge C) Listening D) Mirroring

Computer Science & Information Technology

Red in the VBA Code window indicates properly written programming statements that are free from syntax errors

Indicate whether the statement is true or false

Computer Science & Information Technology

Users have reported issues accessing an Internet website. The network technician wants to verify network layer connectivity. Which of the following tools can provide the verification?

A. ping B. netstat C. route D. arp

Computer Science & Information Technology