CompTIA Security+ SY0-701 Practice Question
Given the following scenarios, which BEST describes a typical behavior of a worm?
Exploits a vulnerability to replicate itself and spread to other systems without user intervention
Encrypts files and demands a ransom for decryption without replicating to other systems
Requires a host file to spread to other systems and remains dormant until certain conditions are met
Resides in the system memory to intercept data and send it to a remote attacker