__________ is the first function in the propagation phase for a network worm.

A. Propagating
B. Fingerprinting
C. Keylogging
D. Spear phishing

B. Fingerprinting

Computer Science & Information Technology

You might also like to view...

How is authorization in vCenter Server handled?

What will be an ideal response?

Computer Science & Information Technology

What should you do if you want to be able locate your laptop in the event of loss or theft and give it a command through the internet to lock it or delete data.

A. set a Bios No access password B. subscribe to LOJack for laptops C. enable the GPS module in the BIOS D. install a high-power wifi card

Computer Science & Information Technology