5.) How are worms different from Trojan horses?(1 point) Responses;

Worms enter a device via an email attachment.

Worms enter a device via an email attachment.

Worms can spread on their own.

Worms can spread on their own.

Worms hide from the user. Worms hide from the user.

Worms delete files.

what one is it?

The correct response is:

- Worms can spread on their own.