Computer viruses, worms, Trojan horses, and rootkits are classified as which of the following?

A. malware
B. untrusted sources
C. threats
D. cybermalls


Answer: A

Computer Science & Information Technology

You might also like to view...

The registry is divided into sections and levels of data. Multiple sections exist to organize data by purpose. What are these individual sections called?

A. keys B. hives C. branches D. nests

Computer Science & Information Technology

Compare the concept of defense-in-depth and the principle of least privilege.

What will be an ideal response?

Computer Science & Information Technology

Web 2.0 marks a change from people simply reading information online to people interacting by both reading and writing online content.

Computer Science & Information Technology

If a container has been placed with absolute or relative positioning, then any object nested within it can be placed with absolute positioning.?

Answer the following statement true (T) or false (F)

Computer Science & Information Technology