Which of the following are based on malicious code?
Each correct answer represents a complete solution. Choose two.
Denial-of-Service (DoS)
Biometrics
Trojan horse
Worm
Submit