Choose the malicious code which can distribute itself without using having to attach to a host file.

Choose the malicious code which can distribute itself without using having to attach to a host file.

Choose the malicious code which can distribute itself without using having to attach to a host file.

A.
A virus.

B.
A logic bomb.

C.
A worm.

D.
A Trojan horse.



Leave a Reply 0

Your email address will not be published. Required fields are marked *