Multiple Choice
This is much like a virus in that it replicates itself but does not require a host file or human action.
A) Viruses
B) Worms
C) Trojans
D) Denial-of service attacks
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q7: Black-hat hackers seek to make systems unusable
Q8: In this attack a perpetrator attempts to
Q9: Black-hat hackers may be contracted or employed
Q10: These hackers break into computer networks not
Q11: What factor affects the availability of security
Q13: This is an attempt to acquire personal
Q14: IT crime are criminal offenses that are
Q15: What is the definition of the following
Q16: If a security technology company cannot make
Q17: What is the definition of the following