Virus authors often use ________ file sharing sites to place infected files hoping you will download and thus install their virus

A) client-server B) peer-to-peer C) server-to-server D) client-to-client

B

Computer Science & Information Technology

You might also like to view...

Historically, VTP supports which range of VLANs?

A) 1-1005 B) 1-512 C) 1-1001 D) 1-4094

Computer Science & Information Technology

For secure communication across the Internet, which protocol is used to access or post web server information?

a. HTTPS b. SHTTP c. Telnet d. STelnet

Computer Science & Information Technology