Which of the following statementsis true about worms?
a. They abuse email systems to send unsolicited email to large numbers of people.
b. They allow hackers to destroy hard drives, corrupt files, and steal passwords by recording keystrokes and transmitting them to a server operated by a third party.
c. They insert unwanted words, numbers, or phrases into documents or alter command functions in an infected document.
d. They propagate without human intervention, often sending copies of themselves to other computers by email.
d. They propagate without human intervention, often sending copies of themselves to other computers by email.
Unlike a computer virus, which requires users to spread infected files to other users, a worm is a harmful program that resides in the active memory of the computer and duplicates itself. Worms differ from viruses in that they can propagate without human intervention, often sending copies of themselves to other computers by email.
You might also like to view...
A(n) ________ is best used for providing services that bring together objects of otherwise unrelated classes.
a) abstract class b) concrete class c) interface d) None of the above.
Match the following terms to their meanings:
I. Theme II. Variant III. Slide layout IV. Comment V. Note A. Provides alternative options for a base theme B. A feedback feature C. Designates the number, location, and related content association of placeholders D. Content that is shard verbally E. Provides a visual structure
Which is a type of DoS attack that blocks the communication capability of a machine or group of machines to use network bandwidth?
a. Gaining access b. Bandwidth consumption c. SYN Flood attacks d. Program and application attacks
Biometric performance factors that need to be considered include accuracy, speed, reliability, acceptability, cost, resistance to counterfeiting, enrollment time, database storage requirements, and intrusiveness.
Answer the following statement true (T) or false (F)