Which of the following techniques virus scanners use to find viruses?

a. Monitors if any program is trying to modify system files
b. Monitors the system for certain type of behaviors typical for viruses
c. Compares the files on the system against a database of known virus files
d. All the above


ANS: D

Computer Science & Information Technology

You might also like to view...

Using the storyboard templates provided, sketch out a few moments of gameplay. Include arrows to indicate directions of motion. How does the gameplay need to change to fit the new format?

What will be an ideal response?

Computer Science & Information Technology

____ is a color mode specifically meant for printed output.

a. RGB b. CMYK c. 8-bit Indexed d. HDR

Computer Science & Information Technology

A(n) ________ button is a ready-made button designed to serve as an icon that can initiate an action when clicked, pointed to, or run over with the mouse

Fill in the blank(s) with correct word

Computer Science & Information Technology

The Hyper-V role-based configuration occurs when Hyper-V is installed as a standalone server product that does not require an installation of Windows Server

Indicate whether the statement is true or false

Computer Science & Information Technology