A ____ combines into one program the characteristics of other attacks.

A. Trojan Horse
B. worm
C. multi-thread virus
D. blended threat

Answer: D

Computer Science & Information Technology

You might also like to view...

________ enables users to define their own data-based tags and facilitates exchange of information between websites

A) XHTML B) PHP C) XML D) HTML

Computer Science & Information Technology

The problem with using the Extend Volume command, when resizing the partition, is that all of your data will be lost

Indicate whether the statement is true or false

Computer Science & Information Technology