Multiple Choice
An independent computer program that copies itself from one computer to another over a network is called a
A) worm.
B) Trojan horse.
C) bug.
D) pest.
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q22: How can a firm's security policies contribute
Q41: Public key encryption uses two keys.
Q42: Biometric authentication is the use of physical
Q43: _ refers to policies, procedures, and technical
Q44: Which of the following is not one
Q45: High-availability computing is also referred to as
Q48: Which of the following statements about the
Q49: The HIPAA Act<br>A) requires financial institutions to
Q50: Tricking employees to reveal their passwords by
Q51: _ is a crime in which an