Multiple Choice
The ________ worm uses flaws in Windows software to take over machines and link them into a virtual computer that can be commanded remotely.
A) Sasser.ftp
B) Conficker
C) ILOVEYOU
D) Melissa
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q7: A(n) _ examines the firm's overall security
Q23: In which method of encryption is a
Q27: Specific security challenges that threaten corporate servers
Q43: The WEP specification calls for an access
Q51: Daniel is sitting home one night and
Q55: Helen downloaded a greeting card program from
Q57: Smartphones share the same security weaknesses as
Q58: A firewall allows the organization to<br>A)enforce a
Q59: _ are specific controls unique to each
Q71: _ is the scientific collection, examination, authentication,