Which one of the following malware types uses built-in propagation mechanisms that exploit system vulnerabilities to spread?
A. Trojan horse
B. Worm
C. Logic bomb
D. Virus
Answer: B. Worm
You might also like to view...
Identify the letter of the choice that best matches the phrase or definition.
A. The traditional page orientation, in which the page is taller than it is wide B. A layout in which you do not have to guess about the width of the user's viewport C. A layout in which the column width is measured in ems D. A type of margin that uses percentages, ems, or other similar values to change in relation to the Web browser size E. A type of section element that is placed within another section element F. The rule used to determine the size of the print area and the margins for printing G. The page orientation in which the page is wider than it is long H. A design that expands or contracts in proportion to the size of the user's viewport I. A property used to determine the size of the page J. A type of layout in which the content looks identical regardless of the browser's resolution K. A style sheet designed to create output for printed copy L. A type of layout in which a liquid layout is combined with a fixed-width layout
When a document created in Word 97 is opened in Word 2016, the words ________ are displayed in the title bar
A) Word 97 B) Compatibility Mode C) Update Available D) Incompatible Version
The ____ object should be used to ensure that the user enters data in a field.
A. RequiredFieldValidator B. RegularExpressionValidator C. RangeValidator D. CompareValidator
What is the difference between creating buttons with and with
What will be an ideal response?