___________________ viruses change the code order of the strain each time they replicate to another machine.
A virus is considered to be “in the ______ ” if it has been reported as replicating and causing harm to computers.
____________ is used in mission critical systems and applications to lock down information based on sensitivity levels (Confidential, Top Secret, etC..