An automated application capable of infecting computers without user interaction would be described as which of the following?
A. A social engineering attack
B. A Trojan
C. A smurf attack
D. A worm
Answer: D. A worm
Computer Science & Information Technology
You might also like to view...
________ is designed to convey an idea using a variety of drawn images, photos, cartoon-like images, sounds, or movie clips
A) Clip art B) A bulleted list C) An anchor D) A theme
Computer Science & Information Technology
Document Comments is a feature that records changes and comments made to a document by others
Indicate whether the statement is true or false
Computer Science & Information Technology