<P> Mitigation techniques include: </P> <Ul> <Li> ACLs in routers and switches </Li> <Li> Packet - filters </Li> <Li> TCP Wrapper / ACL enabled network service daemons </Li> <Li> Nullroute </Li> </Ul> <Li> ACLs in routers and switches </Li> <Li> Packet - filters </Li>

​which of the following is not a characteristic of a computer worm