Choose the option that correctly details the greatest vulnerability of using Instant Messaging clients.

Choose the option that correctly details the greatest vulnerability of using Instant Messaging
clients.

Choose the option that correctly details the greatest vulnerability of using Instant Messaging
clients.

A.
Results in malicious code being delivered by file transfer.

B.
Results in theft of root user credentials.

C.
Results in loss of email privileges.

D.
Results in disconnection from the file server.

E.
Results in slow Internet connections.

F.
Results in Blue Screen of Death errors.

Explanation:

IM clients can also be compromised by malicious code, Trojan Horse programs, and traditional
DoS attacks.
Reference:
Mike Pastore and Emmett Dulaney , Security+ Study Guide , 2nd Edition, Alameda , Sybex , 2004,
p 197



Leave a Reply 0

Your email address will not be published. Required fields are marked *