Drag and drop the description on the left onto the associated items on the right.

DRAG DROP
Drag and drop the description on the left onto the associated items on the right.

DRAG DROP
Drag and drop the description on the left onto the associated items on the right.

Answer: See the explanation

Explanation:
Collection of similar programs that work together to execute specific tasks – botnet
Independent malicious program copies itself from one host to another host over a
network and carries other programs – Viruses
Programs that appear to have one function but actually perform a different function –
Trojan horse
Programs that modify other programs and that attach themselves to other programs on
execution – Worms
http://www.cisco.com/web/about/security/intelligence/virus-wormdiffs.html



Leave a Reply 0

Your email address will not be published. Required fields are marked *