Which two characteristics describe a worm? (Choose two.)Executes when software is run on a computer.
.Hides in a dormant state until needed by an attacker.Infects computers by attaching to software code.
Travels to new computers without any intervention or knowledge of the user
.An employee for a small company inadvertently allows a visitor to see their usernameand password. At home, the visitor then uses this information to gain access to thecompany network. This is an example of what type of threat?man-in-the-middlephishingphysical
spoofingWhich is the best procedure to secure a laptop left at the office while the user is awayfor an extended period of time?Secure by a security cable wrapped around the leg of the user's desk.Put the laptop in a desk drawer in the locked office of the user.