Which one of the following malware types uses built-in propagation mechanisms that exploit system vulnerabilities to spread?
A. Trojan horse
B. Worm
C. Logic bomb
D. Virus
Answer: B. Worm
Computer Science & Information Technology
You might also like to view...
What is the science of fitting the workspace to the worker?
A) Biometrics B) Ergonomics C) Genomics D) Workplace safety
Computer Science & Information Technology
There are six key elements that the CP team must build into the DR plan. What are three of them?
What will be an ideal response?
Computer Science & Information Technology