____ often exploit well-known security vulnerabilities in popular software to spread destructive programs such as viruses, worms, and Trojan horses.

A. Maskers
B. Hackers
C. Stoppers
D. Networkers


Answer: B

Computer Science & Information Technology

You might also like to view...

MC The method______ converts two objects to the same type.

a)__eq__. b) __coerce__. c) __convert__. d) None of the above.

Computer Science & Information Technology

The Collection class or interface that allows only unique elements is the ___________ class or interface.

(a) List (b) Set (c) Vector (d) all of the above

Computer Science & Information Technology

The threat of ____ involves a malicious individual observing another's password by watching the victim while they are performing system login activities.

A. packet monkeys B. intellectual property C. shoulder surfing D. script kiddies

Computer Science & Information Technology

Which of the following is the path to the Shading arrow?

A. (TABLE TOOLS DESIGN tab | Table Styles group) B. (TABLE TOOLS FORMAT tab | Colors group) C. (TABLE TOOLS LAYOUT tab | Styles group) D. (TABLE TOOLS COLORS tab | Shading group)

Computer Science & Information Technology