A key characteristic of a(n) ____ is the ability to lurk in a computer for days or months, quietly copying itself.
A. worm
B. bug
C. virus
D. Trojan horse
Answer: C
You might also like to view...
Create FTP Traffic
  In this activity, you will use Packet Tracer to sniff and log network traffic. You will view a security vulnerability in one network application, and view logged ICMP traffic with syslog.
To insert a comment in a specific location on a slide ________
A) position the insertion point in the desired location B) click the Insert Comment Here button C) press Ctrl + I D) select the appropriate thumbnail from the Slide pane
Any form of authentication that uniquely identifies you, such as your retinal patterns or fingerprints is called ____________________.
Fill in the blank(s) with the appropriate word(s).
With _________, the customer manages applications and data while the vendor manages the operating system, servers, virtualization, storage, and networking.
A. DaaS B. IaaS C. PaaS D. SaaS