What type of malicious program cannot stand on its own and can replicate itself through an executable program attached to an e-mail?

A. shell
B. virus
C. keylogger
D. rootkit

Answer: B

Computer Science & Information Technology

You might also like to view...

Any code that is designed to hide the existence of processes and privileges is referred to as a(n) _______.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

The eight queens problem can be solved using a stack and parsing logic.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology