There are several types of malicious code attacks that a hacker can use to gain entry into or compromise a computer system. In this type of malicious code attack, self-replicating programs are installed, copied, and spread them to other machines:

a. Trojan Horses
b. Virus
c. Worms
d. Logic Bombs


c. Worms

Criminal Justice

You might also like to view...

_______ refers to the purposive exposure of private sexual parts in order to elicit shock in unsuspecting victims.

Fill in the blank(s) with the appropriate word(s).

Criminal Justice

What are three types of Longitudinal designs?

What will be an ideal response?

Criminal Justice

Attorney General Eric Holder felt that ______.

A. federal authorities should pursue the mandatory minimum charge on drug cases B. authorities should look for add-on drug charges when making arrests C. authorities should reduce the use of incarceration in dealing with drug cases D. the use of specialty courts was too costly and should be reduced or eliminated

Criminal Justice

The latest publication of the Monitoring the Future study indicates that the nation has experienced a "generation history gap" in people's understanding of the harmful effects of ________

Fill in the blank(s) with correct word

Criminal Justice