Which of the following statements correctly describes the malware characteristic of polymorphism?

a. Polymorphic malware can change its characteristics every time it is transferred to a new system.
b. Polymorphic malware is designed to activate on a particular date, remaining harmless until that time.
c. Polymorphic malware is software that disguises itself as a legitimate program, or replaces a legitimate program's code with destructive code.
d. Polymorphic malware utilizes encryption to prevent detection.


ANSWER: a

Computer Science & Information Technology

You might also like to view...

You can use the ____________________ Query Wizard to retrieve duplicate records in a table.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Audio circuitry is typically equipped to accept output from a microphone and send input to speakers or headphones.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

At what layer does a router work?

What will be an ideal response?

Computer Science & Information Technology

Match the type of analysis with its function or description

I. Pattern A. Uses sophisticated algorithms II. Content B. Uses a baseline to detect abnormalities III. Playback C. Correlates events in a chronological order IV. Timeline sequencing D. Can recreate entire "conversations"

Computer Science & Information Technology