A key characteristic of a(n) ____ is the ability to lurk in a computer for days or months, quietly copying itself.

A. worm
B. bug
C. virus
D. Trojan horse


Answer: C

Computer Science & Information Technology

You might also like to view...

Create FTP Traffic

![15403|636x285](upload://8ISJT7xcALdL84s5XDtMSX9YmY7.jpeg) ![15404|634x148](upload://dPCEARuWA6cOFi6ukQ3IJbiYSZd.jpeg) In this activity, you will use Packet Tracer to sniff and log network traffic. You will view a security vulnerability in one network application, and view logged ICMP traffic with syslog.

Computer Science & Information Technology

To insert a comment in a specific location on a slide ________

A) position the insertion point in the desired location B) click the Insert Comment Here button C) press Ctrl + I D) select the appropriate thumbnail from the Slide pane

Computer Science & Information Technology

Any form of authentication that uniquely identifies you, such as your retinal patterns or fingerprints is called ____________________.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

With _________, the customer manages applications and data while the vendor manages the operating system, servers, virtualization, storage, and networking.

A. DaaS B. IaaS C. PaaS D. SaaS

Computer Science & Information Technology