Which of the following statements is true about worms?
a. They abuse email systems to send unsolicited email to large numbers of people.
b. They allow hackers to destroy hard drives, corrupt files, and steal passwords by recording keystrokes and transmitting them to a server operated by a third party.
c. They insert unwanted words, numbers, or phrases into documents or alter command functions in an infected document.
d. They propagate without human intervention, often sending copies of themselves to other computers by email.
d. They propagate without human intervention, often sending copies of themselves to other computers by email.
You might also like to view...
You should arrange multiple catch blocks in order from the most general to the most specific.
Answer the following statement true (T) or false (F)
Which routing protocols are supported by the software package Zebra?
What will be an ideal response?
C++ provides for _______, which allows a derived class to inherit from many base class- es, even if the base classes are unrelated.
Fill in the blank(s) with the appropriate word(s).
An agent may be a permanent NAC agent and reside on end devices until uninstalled, but it cannot be a dissolvable NAC agent.
Answer the following statement true (T) or false (F)