Multiple Choice
Pieces of code that are executed after the virus or worm has spread are called ________.
A) vulnerabilities
B) exploits
C) compromises
D) payloads
E) All of the above.
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q1: Which of the following can spread more
Q2: Malware programs that masquerade as system files
Q3: With complex passwords,adding a single character increases
Q4: The threat environment includes _.<br>A)attackers<br>B)attacks<br>C)Both A and
Q6: Rehearsing response during planning makes actual response
Q7: Which of the following sometimes uses direct
Q8: Which phase of the plan-protect-respond cycle takes
Q10: Passwords are widely used because _.<br>A)they can
Q11: Passwords are widely used because they can
Q42: Fingerprint scanning may be an acceptable access