Gwen has discovered a program that has copied itself throughout the network. The program does not appear to have a host program and is overloading the network as it replicates. It has even installed a web server on the network and is allowing other computers to connect.
 
What type of malware has Gwen discovered?

A. Worm
B. Trojan
C. Spyware
D. Rootkit


Answer: A

Computer Science & Information Technology

You might also like to view...

Web designers avoid using the space and underscore characters when naming files.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

The company with which you have a contract to provide television programs is referred to as a(n) ________

Fill in the blank(s) with correct word

Computer Science & Information Technology

In addition to RDoc, you can view Ruby documentation using either the ri or the vd command line commands on your computer.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

When you choose the ____ compression setting, photos are compressed to the resolution specified on the Advanced tab in the PowerPoint Options dialog box.

A. No compression B. Yes compression C. Document resolution D. Compression resolution

Computer Science & Information Technology