Which of the following are based on malicious code?
Each correct answer represents a complete solution. Choose two.
A . Worm
B . Biometrics
C . Denial-of-Service (DoS)
D . Trojan horse
Answer: A,D
Which of the following are based on malicious code?
Each correct answer represents a complete solution. Choose two.
A . Worm
B . Biometrics
C . Denial-of-Service (DoS)
D . Trojan horse
Answer: A,D