1. Which of these attack exploits Human Vulnerabilities
2. Which of these are not a real threat but a potential threat
3. Which is/are a Malware ?
4. Which of these propagates automatically ?
5. Which of these is self-injected into other software ?