Multiple Choice
In the context of intentional threats,_____ can erase data and wreak havoc on computers and networks,but they do not replicate themselves.
A) Trojan programs
B) worms
C) logic bombs
D) backdoors
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q35: Which of the following is true of
Q36: Describe asymmetric encryption.
Q38: Confidentiality,integrity,and availability are collectively referred to as
Q39: In data encryption,a(n)_ enables users of the
Q41: _ encryption usually works better for public
Q42: _ can interfere with users' control of
Q43: _ is a software feature that erases
Q44: To ensure confidentiality,accuracy,and integrity of data,a level
Q45: A _ travels from computer to computer
Q97: The main function of Cyber Incident Response