____ often exploit well-known security vulnerabilities in popular software to spread destructive programs such as viruses, worms, and Trojan horses.
A. Maskers
B. Hackers
C. Stoppers
D. Networkers
Answer: B
Computer Science & Information Technology
You might also like to view...
All text boxes in a Word document must be drawn in a document
Indicate whether the statement is true or false
Computer Science & Information Technology
Which device can connect many computers and sends data only out of one port?
a. Hub b. Repeater c. Switch d. Router
Computer Science & Information Technology