One of the armored virus infection techniques utilizes encryption to make virus code more difficult to detect, in addition to separating virus code into different pieces and inject these pieces throughout the infected program code. What is the name for this technique?

A. stealth
B. appender
C. Swiss cheese
D. split


Answer: C

Computer Science & Information Technology

You might also like to view...

Which of the following performs a boxing conversion?

a. int x = 7; b. Integer x = 7; c. Neither of the above. d. Both of the above.

Computer Science & Information Technology

What is the difference between lossless compression and lossy compression? Which type of sound files use what type of compression?

What will be an ideal response?

Computer Science & Information Technology

________ is not a common access right.

a) Remove b) Read c) Write d) Execute

Computer Science & Information Technology

______________ is a terminal emulation program for TCP/IP networks that uses port 23 and enables you to connect to a server or fancy router and run commands on that machine as if you were sitting in front of it.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology