Short Answer
_____ are independent programs that can spread themselves without having to be attached to a host program.
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q27: How are identification (ID)badges used as a
Q49: Spoofing is sending fraudulent e-mails that seem
Q55: _ is the process of capturing and
Q64: Social engineering is an example of an
Q68: Describe how uninterruptible power supply (UPS) is
Q71: _ is sending fraudulent e-mails that seem
Q72: Which of the following is a biometric
Q75: Similar to phishing,_ is directing Internet users
Q96: A _ plan lists the tasks that
Q98: A distributed denial-of-service (DDoS)attack involves hundreds of