Heather is doing a malware protection penetration test for her customer. She's created a malware program that doesn't require human participation and wants to test how far it can go across the network. Which of the following malware kinds is she utilizing?
Comments