Question 1
What kind of malware is designed to take advantage of a security hole ?
A
Bluetooth
B
VOIP
C
NFC
D
Ethernet
NEXT QUESTION
Question 2
What kind of malware is designed to take advantage of a security hole ?
A
Virus
B
Ransomware
C
Zero-day exploit
D
Trojan horse
NEXT QUESTION
Question 3
In which decade with the first transatlantic radio broadcast occur?
A
1850s
B
1860s
C
1950s
D
1890s
Submit
Congratulations! You did Great Job.
Go Back