Choose the option that correctly details the greatest vulnerability of using Instant Messaging
clients.
A.
Results in malicious code being delivered by file transfer.
B.
Results in theft of root user credentials.
C.
Results in loss of email privileges.
D.
Results in disconnection from the file server.
E.
Results in slow Internet connections.
F.
Results in Blue Screen of Death errors.
Explanation:
IM clients can also be compromised by malicious code, Trojan Horse programs, and traditional
DoS attacks.
Reference:
Mike Pastore and Emmett Dulaney , Security+ Study Guide , 2nd Edition, Alameda , Sybex , 2004,
p 197