Which of these security threats is designed to replicate itself without any user intervention?
A) Computer virus
B) Worm
C) Phishing
D) Rootkit
E) My replicator is a bit slower than most
Pages: 1 2
Which of these security threats is designed to replicate itself without any user intervention?
A) Computer virus
B) Worm
C) Phishing
D) Rootkit
E) My replicator is a bit slower than most