Virus authors often use ________ file sharing sites to place infected files hoping you will download and thus install their virus
A) client-server B) peer-to-peer C) server-to-server D) client-to-client
B
Computer Science & Information Technology
You might also like to view...
Historically, VTP supports which range of VLANs?
A) 1-1005 B) 1-512 C) 1-1001 D) 1-4094
Computer Science & Information Technology
For secure communication across the Internet, which protocol is used to access or post web server information?
a. HTTPS b. SHTTP c. Telnet d. STelnet
Computer Science & Information Technology