An automated application capable of infecting computers without user interaction would be described as which of the following?

A. A social engineering attack
B. A Trojan
C. A smurf attack
D. A worm

Answer: D. A worm

Computer Science & Information Technology

You might also like to view...

________ is designed to convey an idea using a variety of drawn images, photos, cartoon-like images, sounds, or movie clips

A) Clip art B) A bulleted list C) An anchor D) A theme

Computer Science & Information Technology

Document Comments is a feature that records changes and comments made to a document by others

Indicate whether the statement is true or false

Computer Science & Information Technology