Which type of malware exploits a vulnerability on one system and then immediately searches for another computer on the network that has the same vulnerability?

A. worm
B. virus
C. Trojan horse
D. mass-mailer


Answer: A

Computer Science & Information Technology

You might also like to view...

Keychain Access is a password management utility

Indicate whether the statement is true or false

Computer Science & Information Technology

The Internet Protocol Suite Network Access layer allows the IP to transfer packets across a link.

a. true b. false

Computer Science & Information Technology

What protocol does a network-attached printer that can print over the Internet use?

A. HTTP B. FTP C. IPP D. PPP

Computer Science & Information Technology

What are some best practices to follow when utilizing the Encrypting File System?

What will be an ideal response?

Computer Science & Information Technology