A(n) ____ is a program that is relayed by a disk or a file and has the ability to replicate throughout a system, but does not create new files.
A. buffer attack
B. virus
C. worm
D. hoax
Answer: B
You might also like to view...
A reserved area for text or graphics that displays at the bottom of each page in a document
a. Header b. Footnote c. Footer
You can apply all sorts of affects to a picture, like a pencil sketch, an oil painting, or glowing edges, all with just one click on the ____________________ gallery.
Fill in the blank(s) with the appropriate word(s).
Which of the following security evaluation criteria was developed jointly by NIST and NSA?
A. The Federal Criteria for Information Technology Security B. The Trusted Computer System Evaluation Criteria C. The Information Technology Security Evaluation Criteria D. The Common Criteria
____ are random alphanumeric strings that identifies a session.
A. Cookies B. Functions C. Session IDs D. Hidden form fields