Which of the following doesn't attach itself to a host but can replicate itself?

a. Worm
b. Virus
c. Trojan program
d. Buffer overflow


Answer: a. Worm

Computer Science & Information Technology

You might also like to view...

A(n) ________ member variable may be accessed before any objects of the class have been declared.

A) private B) public C) inline D) static E) None of the above

Computer Science & Information Technology

The operating system's application programming interface (API) provides software developers with tools they use to build application software without needing to understand the inner workings of the operating system and hardware.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Answer the following statements true (T) or false (F)

1. The purpose of an ARP reply is to acquire the IP address. 2. The purpose of the keepalive packet is to indicate that the Ethernet interface is connected to another networking device. 3. The show ip interface brief command shows Yes in the OK? column. This indicates that keepalive packets are being exchanged. 4. Unlike a router, a switch is an OSI layer 2 device and operates by storing and forwarding the MAC addresses. 5. ARP stands for Address Resolution Protocol.

Computer Science & Information Technology

The average amount of bandwidth that is expected and ordered on a WAN link is referred to as the ________

A) PBR B) AVR C) PIR D) CIR

Computer Science & Information Technology