What type of malicious logic can become active on an information system without the need to infect a file?

What type of malicious logic can become active on an information system without the need to infect a file?



a. Virus.
b. Trojan horse.
c. Worm.
d. Bot.




Answer: C