_______ are programs that migrate through networks and operating systems and attach themselves to various other programs and databases.
A. Viruses
B. Zombies
C. Web bugs
DoS
查看答案
A(n) _______ attempts to slow down or stop a computer system or network by sending repetitive requests for information.
A. zombie
B. DoS attack
C. worm
D. Trojan horse
A deceptive act, using the Internet, to trick people into spending their money and time for no gain is called an Internet _______.
A. worm
B. cookie
C. scam
D. malware
_______ attempts to trick Internet users into thinking a fake but official-looking website or e-mail is legitimate.
A first-party cookie
B. A Trojan horse
C. A third-party cookie
D. Phishing
Computers infected by a virus, worm, or Trojan horse that allows them to be remotely controlled for malicious purposes are called _______.
A. zombies
B. DoS sites
C. phishes
D. Web bugs