Which of the following malware can monitor network traffic and take a snapshot of the target system?

A) Flame
B) Smurf
C) Ping of Death
D) My Doom

A) Flame

Computer Science & Information Technology

You might also like to view...

After a background process has been started, what command below can be used to move it to the foreground?

A. fg B. fgnd C. fgd D. b2f

Computer Science & Information Technology

You can think of a mask in Flash as a ____.

a. spotlight b. magnet c. scalpel d. costume mask

Computer Science & Information Technology