Multiple Choice
A program that is covertly inserted into a system with the intent of compromising the integrity or confidentiality of the victim's data is __________.
A) Adobe
B) Animoto
C) malware
D) Prezi
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q3: Many forms of infection can be blocked
Q29: Two types of perimeter monitoring software are
Q30: E-mail is a common method for spreading
Q31: In addition to propagating, a worm usually
Q32: A _ is a collection of bots
Q33: Keyware captures keystrokes on a compromised system.
Q35: A Trojan horse is an apparently useful
Q37: Unsolicited bulk e-mail is referred to as
Q38: A virus that attaches to an executable
Q39: The ideal solution to the threat of