1. …………….. are used in denial of service attacks, typically against targeted web sites.A) Worm B) ZombieC) VirusD) Trojan horse2. Select the correct order for the different phases of virus execution.i) Propagation phase ii) Dormant phaseiii) Execution phase iv) Triggering phaseA) i, ii, iii, and ivB) i, iii, ii and ivC) ii, i, iv an iiiD) ii, iii, iv and i3. A ………………… attaches itself to executable files and replicates, when the infected program is executed, by finding other executable files to infect.A) Stealth virusB) Polymorphic...