Which one of the following malware types uses built-in propagation mechanisms that exploit system vulnerabilities to spread?

A. Trojan horse
B. Worm
C. Logic bomb
D. Virus

Answer: B. Worm

Computer Science & Information Technology

You might also like to view...

What is the science of fitting the workspace to the worker?

A) Biometrics B) Ergonomics C) Genomics D) Workplace safety

Computer Science & Information Technology

There are six key elements that the CP team must build into the DR plan.  What are three of them?

What will be an ideal response?

Computer Science & Information Technology