GIAC GCIH Question Answer
Which of the following threats is a combination of worm, virus, and Trojan horse characteristics?
Spyware
Heuristic
Blended
Rootkits
TESTED 13 Jul 2025
Copyright © 2014-2025 ACE4Sure. All Rights Reserved