What type of malicious program cannot stand on its own and can replicate itself through an executable program attached to an e-mail?
A. shell
B. virus
C. keylogger
D. rootkit
Answer: B
Computer Science & Information Technology
You might also like to view...
Any code that is designed to hide the existence of processes and privileges is referred to as a(n) _______.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology
The eight queens problem can be solved using a stack and parsing logic.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology