Multiple Choice
The Conficker worm took advantage of a vulnerability in ____ to run arbitrary code on susceptible hosts.
A) SQL Server
B) RPC
C) Windows Registry
D) NetBIOS
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q4: What is the purpose of a file
Q26: MBSA has its origins in the _
Q27: Why is NetBIOS still used sometimes?
Q29: MATCHING<br>Match each term with the correct statement
Q32: Microsoft's Systems Management Server (SMS) can manage
Q33: The best way to protect a network
Q34: MATCHING<br>Match each term with the correct statement
Q35: Windows Server 2003 and 2008 _ are
Q36: Early Windows OSs communicated with each other
Q58: What functions do most Trojan programs perform?