Multiple Choice
Hackers identify possible victim computers by sending ________.
A) worms
B) probe packets
C) hacks
D) exploits
E) compromises
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q13: Viruses most commonly spread from one computer
Q14: Spam can be used to _.<br>A)implement a
Q15: The digital certificate provides the _.<br>A)private key
Q17: In digital certificate authentication,the verifier gets the
Q19: Which of the following is a propagation
Q23: Scripts are likely to be dangerous only
Q44: A _ is a flaw in a
Q100: A compromise is an attempted attack.
Q118: Universal malware requires a vulnerability to succeed.
Q143: Actions that people are allowed to take