Multiple Choice
In the context of the common intentional security threats, which statement best describes a worm?
A) It travels from computer to computer in a network, but it does not usually erase data.
B) It attaches itself to a host program to spread to other files in a computer.
C) It is a programming routine built into a system by its designer to bypass system security and sneak back into the system later to access data.
D) It floods a network or server with service requests to prevent legitimate users' access to the system.
Correct Answer:

Verified
Correct Answer:
Verified
Q83: Which statement is true of asymmetric encryption?<br>A)It
Q84: The process of capturing and recording network
Q85: _, a more recent cryptographic protocol, ensures
Q86: _ outlines procedures for keeping an organization
Q87: Spoofing happens when:<br>A)a word is converted into
Q89: _ is an attempt to gain access
Q90: A level 1 security system is used
Q91: Which statement is true of phishing?<br>A)It involves
Q92: In the context of intentional security threats,
Q93: Which of the following is recommended in