Question


In the figure above, the worm enters the original host and other unprotected hosts using ____.
a. infected files c. e-mail
b. a backdoor d. a packet

Answer

This answer is hidden. It contains 1 characters.