Which type of malware exploits a vulnerability on one system and then immediately searches for another computer on the network that has the same vulnerability?
A. worm
B. virus
C. Trojan horse
D. mass-mailer
Answer: A
Computer Science & Information Technology
You might also like to view...
Keychain Access is a password management utility
Indicate whether the statement is true or false
Computer Science & Information Technology
The Internet Protocol Suite Network Access layer allows the IP to transfer packets across a link.
a. true b. false
Computer Science & Information Technology
What protocol does a network-attached printer that can print over the Internet use?
A. HTTP B. FTP C. IPP D. PPP
Computer Science & Information Technology
What are some best practices to follow when utilizing the Encrypting File System?
What will be an ideal response?
Computer Science & Information Technology