Which type of attack best describes how this scenario got started?

A malicious program is disguised as another useful program; consequently, when the user executes the program, files get erased and then the malicious program spreads itself using emails as the delivery mechanism. Which type of attack best describes how this scenario got started?

A malicious program is disguised as another useful program; consequently, when the user executes the program, files get erased and then the malicious program spreads itself using emails as the delivery mechanism. Which type of attack best describes how this scenario got started?

A.
DoS

B.
worm

C.
virus

D.
trojan horse

E.
DDoS



Leave a Reply 0

Your email address will not be published. Required fields are marked *