__________ is the first function in the propagation phase for a network worm.
A. Propagating
B. Fingerprinting
C. Keylogging
D. Spear phishing
B. Fingerprinting
Computer Science & Information Technology
You might also like to view...
How is authorization in vCenter Server handled?
What will be an ideal response?
Computer Science & Information Technology
What should you do if you want to be able locate your laptop in the event of loss or theft and give it a command through the internet to lock it or delete data.
A. set a Bios No access password B. subscribe to LOJack for laptops C. enable the GPS module in the BIOS D. install a high-power wifi card
Computer Science & Information Technology