Multiple Choice
Which of the following statements is true of a worm?
A) It is usually hidden inside a popular program, but it is not capable of replicating itself.
B) It floods a network or server with service requests to prevent legitimate users' access to the system.
C) It is an independent program that can spread itself without attaching itself to a host program.
D) It enables a system designer to bypass the security of a system and sneak back into the system later to access files.
Correct Answer:

Verified
Correct Answer:
Verified
Q1: When using mirror disks, if one of
Q2: The cost of setting up a virtual
Q3: _ uses a public key known to
Q5: _ is a method of access control
Q6: An organization's comprehensive security plan should include
Q7: In the context of intentional computer and
Q8: _ is the unauthorized use of system
Q9: If disaster strikes, which of the following
Q10: A(n)_ contains code intended to disrupt a
Q11: _ can interfere with users' control of