Which of the following malicious codes is used by a hacker to get control over the system files of a victim?
What is the name of the first computer virus that infected the boot sector of the MS-DOS operating system?
Which of the following protocols of the TCP/IP suite is used in the application layer of the OSI model?