A self-contained program that spreads through a computer network by exploiting security holes is called a
a. hack.
b. rogue.
c. Trojan horse.
d. virus.
e. worm.
E
You might also like to view...
Given the following declarations, which of the following is legal syntax?
string str="Your name"; char c_string[20]="My name"; a. str = c_string; b. c_string = str; c. strcpy(c_string, str.c_str()); d. strcpy(c_string, str); e. A and C
Which level of management makes decisions using predetermined rules that have predictable outcomes?
A) operations B) middle C) strategic D) None are interested in detailed information.
Which of the following deals with the science of measuring individual body characteristics?
A) antivirus software B) biometrics C) encryption D) hacking E) security
Users cannot print to a network printer. After physically checking the printer everything appears to be functioning correctly on the printer. Which of the following is the MOST likely cause of the problem?
A. The printer is out of memory. B. The printer is disconnected from the network. C. The printer is out of paper. D. The printer is not powered on.