Tea, Earl Grey, Hot



Which of these security threats is designed to replicate itself without any user intervention?

A) Computer virus

B) Worm

C) Phishing

D) Rootkit

E) My replicator is a bit slower than most


The answer: B) Worm

One of the distinguishing characteristics of a worm is its ability to jump between systems and spread infection without the need of any human intervention.

Want to know more? Watch “Common Security Threats.”

There are many security threats constantly attacking our computers and our data. In this video, you’ll learn about social engineering, shoulder surfing, malware, rootkits, and much more.