Respuesta :

All threats can include computer viruses, Trojan horse program, worms, exploit scripts and toolkit.

Otras preguntas