A ________ is the form of malware that spreads over network connections without any human intervention.
a. virus
b. logic bomb
c. rootkit
d. worm
d. worm
You might also like to view...
When the results of using the COUNT or MAXIMUM aggregate functions in a query are displayed, they appear in the Total row
Indicate whether the statement is true or false
The exact set of steps used to solve a problem is called a(n) ____________________.
Fill in the blank(s) with the appropriate word(s).
Access control at many businesses and organizations is provided by ____, which allow only authorized individuals to enter an office building, punch in or out of work, or access the company network via an access card or a fingerprint or hand scan.
A. bar codes B. virtual reality glasses C. collaboration systems D. authentication systems
Identifying residual risk is MOST important to which of the following concepts?
A. Risk deterrence B. Risk acceptance C. Risk mitigation D. Risk avoidance