Multiple Choice
________ take advantage of vulnerabilities in software.
A) Direct-propagation worms
B) Trojan horses
C) Blended threats
D) Bots
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q28: Hackers sold stolen credit card information gained
Q29: Illegally stealing a company's trade secrets is
Q30: It is most common for cyberterrorists to
Q31: Credit card theft is also known as
Q32: Data from Target customers was stolen _.<br>A)
Q34: Detective countermeasures is considered one of the
Q35: A company's website and Facebook pages may
Q36: The act of implementing an attacker's exploit
Q37: Stolen information is commonly used for _.<br>A)
Q38: Traditional hackers often focused on embarrassing a