Gwen has discovered a program that has copied itself throughout the network. The program does not appear to have a host program and is overloading the network as it replicates. It has even installed a web server on the network and is allowing other computers to connect.
What type of malware has Gwen discovered?
A. Worm
B. Trojan
C. Spyware
D. Rootkit
Answer: A
Computer Science & Information Technology
You might also like to view...
Web designers avoid using the space and underscore characters when naming files.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
The company with which you have a contract to provide television programs is referred to as a(n) ________
Fill in the blank(s) with correct word
Computer Science & Information Technology
In addition to RDoc, you can view Ruby documentation using either the ri or the vd command line commands on your computer.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
When you choose the ____ compression setting, photos are compressed to the resolution specified on the Advanced tab in the PowerPoint Options dialog box.
A. No compression B. Yes compression C. Document resolution D. Compression resolution
Computer Science & Information Technology