how long are IPv4 addresses
32-bit
What is a network standards architecture ?
TCP/IP
____ are pieces of code that attach to other programs and get executed when the infested program is executed
Viruses
Pieces of code that are executed after the virus or worm has spread are called___
Payloads
Malware programs that masquerade as system files are called
Trojan horses
An attack in which an authentic-looking e-mail or website entices a user to enter his or her username, password, or other sensitive information is called ________.
Phishing