Choose the malicious code which can distribute itself without using having to attach to a host file.
A.
A virus.
B.
A logic bomb.
C.
A worm.
D.
A Trojan horse.
Choose the malicious code which can distribute itself without using having to attach to a host file.
Choose the malicious code which can distribute itself without using having to attach to a host file.
A.
A virus.
B.
A logic bomb.
C.
A worm.
D.
A Trojan horse.