Title: In the context of the common intentional security threats, which of the following statements best ... Post by: Heskeksndfb on Jan 31, 2018 In the context of the common intentional security threats, which of the following statements best describes a worm?
A) It travels from computer to computer in a network, but it does not usually erase data. B) It attaches itself to a host program to spread to other files in a computer. C) It is a programming routine built into a system by its designer to bypass system security and sneak back into the system later to access data. D) It floods a network or server with service requests to prevent legitimate users' access to the system. Title: In the context of the common intentional security threats, which of the following statements best ... Post by: casssm on Jan 31, 2018 Content hidden
|