Multiple Choice
____ often exploit well-known security vulnerabilities in popular software to spread destructive programs such as viruses, worms, and Trojan horses.
A) Maskers
B) Hackers
C) Stoppers
D) Networkers
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q87: A(n) _ meeting allows collaboration between participants,
Q88: A transceiver is a single component that
Q89: The primary tools used to provide transaction
Q90: The current IP standard lengthens IP addresses
Q91: A token ring is a program that
Q93: When an organization wants to use encryption,
Q94: A credit card is a plastic card
Q95: Multiple groups of computers and devices that
Q96: Twisted-pair cable, which contains glass fibers surrounded
Q97: A(n) _ is an internal expansion card