In the context of the common intentional security threats, which statement best describes a worm? a. It floods a network or server with service requests to prevent legitimate users’ access to the system. b. It attaches itself to a host program to spread to other files in a computer. c. It is a programming routine built into a system by its designer to bypass system security and sneak back into the system later to access data. d. It travels from computer to computer in a network, but it does not usually erase data.

Respuesta :

Answer:

D: It travels from computer to computer in a network, but it does not usually erase data.

Explanation:

A worm and a virus are similar in nature and how they are programmed to operate. However, unlike viruses, worms are independent and do not necessarily need to attach themselves to other programs. They spread replicate copies of themselves from one PC to another. Choosing option B is wrong because they are standalone and do not need to attach themselves to a host program too. Worms look for vulnerable systems that can be exploited and spread their wings from PC to PC found in a network. Thus, option D is correct. Worms do not necessary erase data. There are a few that can do that but not all.