____ often exploit well-known security vulnerabilities in popular software to spread destructive programs such as viruses, worms, and Trojan horses.

A. Maskers
B. Hackers
C. Stoppers
D. Networkers

Answer: B

Computer Science & Information Technology

You might also like to view...

All text boxes in a Word document must be drawn in a document

Indicate whether the statement is true or false

Computer Science & Information Technology

Which device can connect many computers and sends data only out of one port?

a. Hub b. Repeater c. Switch d. Router

Computer Science & Information Technology