Which of the following statements correctly describes the malware characteristic of polymorphism?
a. Polymorphic malware can change its characteristics every time it is transferred to a new system.
b. Polymorphic malware is designed to activate on a particular date, remaining harmless until that time.
c. Polymorphic malware is software that disguises itself as a legitimate program, or replaces a legitimate program's code with destructive code.
d. Polymorphic malware utilizes encryption to prevent detection.
ANSWER: a
You might also like to view...
You can use the ____________________ Query Wizard to retrieve duplicate records in a table.
Fill in the blank(s) with the appropriate word(s).
Audio circuitry is typically equipped to accept output from a microphone and send input to speakers or headphones.
Answer the following statement true (T) or false (F)
At what layer does a router work?
What will be an ideal response?
Match the type of analysis with its function or description
I. Pattern A. Uses sophisticated algorithms II. Content B. Uses a baseline to detect abnormalities III. Playback C. Correlates events in a chronological order IV. Timeline sequencing D. Can recreate entire "conversations"