Multiple Choice
Which of the following statements is true about worms?
A) They abuse email systems to send unsolicited email to large numbers of people.
B) They allow hackers to destroy hard drives,corrupt files,and steal passwords by recording keystrokes and transmitting them to a server operated by a third party.
C) They insert unwanted words,numbers,or phrases into documents or alter command functions in an infected document.
D) They propagate without human intervention,often sending copies of themselves to other computers by email.
Correct Answer:

Verified
Correct Answer:
Verified
Q14: Which of the following statements is true
Q15: Those who capture trade secrets and attempt
Q16: Which of the following statements defines an
Q17: Explain the need for a security audit
Q18: A rootkit can be disinfected without formatting
Q20: _ serves as a clearinghouse for information
Q21: Botnet computers are also called _.<br>A)zombies<br>B)daemons<br>C)narutus<br>D)konohas
Q22: What are the steps that can be
Q23: Which of the following is true of
Q24: Worms propagate without human intervention and send