Problem:
Question 1: What part of the definition for protocol would we use to describe the exchange of "greetings" between machines known as the three way handshake?
Question 2: When malware exhibits stealth and persistence through OS corruption, it's demonstrating worm like characteristics. True or False
Include source of information for best answer.