Multiple Choice
In the context of intentional security threats, _____ can erase data and wreak havoc on computers and networks but do not replicate themselves.
A) Trojan programs
B) worms
C) viruses
D) McCumber cubes
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q87: Spoofing happens when:<br>A)a word is converted into
Q88: In the context of the common intentional
Q89: _ is an attempt to gain access
Q90: A level 1 security system is used
Q91: Which statement is true of phishing?<br>A)It involves
Q93: Which of the following is recommended in
Q94: In the context of intentional computer and
Q95: In the context of e-commerce transaction security
Q96: In the context of the CIA triangle,
Q97: The main function of Cyber Incident Response