Collect data
Delete data
Modify data
Which of the following are the primary payload capabilities found in malware? (Choose all that apply.)
Group of answer choices
Collect data
Delete data
Modify data
Launch attacks
1 answer