MBA5141 Chapter-8
1.Malicious software programs referred to as spyware include a variety of threats such as computer viruses, worms, and Trojan horses.A False 2. Currently, the protocols used for secure information transfer over the Internet are:A SSL, TLS, and S-HTTP. 3. A…
