____ often exploit well-known security vulnerabilities in popular software to spread destructive programs such as viruses, worms, and Trojan horses.
A. Maskers
B. Hackers
C. Stoppers
D. Networkers
Answer: B
You might also like to view...
MC The method______ converts two objects to the same type.
a)__eq__. b) __coerce__. c) __convert__. d) None of the above.
The Collection class or interface that allows only unique elements is the ___________ class or interface.
(a) List
The threat of ____ involves a malicious individual observing another's password by watching the victim while they are performing system login activities.
A. packet monkeys B. intellectual property C. shoulder surfing D. script kiddies
Which of the following is the path to the Shading arrow?
A. (TABLE TOOLS DESIGN tab | Table Styles group) B. (TABLE TOOLS FORMAT tab | Colors group) C. (TABLE TOOLS LAYOUT tab | Styles group) D. (TABLE TOOLS COLORS tab | Shading group)