Which of the following techniques virus scanners use to find viruses?
a. Monitors if any program is trying to modify system files
b. Monitors the system for certain type of behaviors typical for viruses
c. Compares the files on the system against a database of known virus files
d. All the above
ANS: D
You might also like to view...
Using the storyboard templates provided, sketch out a few moments of gameplay. Include arrows to indicate directions of motion. How does the gameplay need to change to fit the new format?
What will be an ideal response?
____ is a color mode specifically meant for printed output.
a. RGB b. CMYK c. 8-bit Indexed d. HDR
A(n) ________ button is a ready-made button designed to serve as an icon that can initiate an action when clicked, pointed to, or run over with the mouse
Fill in the blank(s) with correct word
The Hyper-V role-based configuration occurs when Hyper-V is installed as a standalone server product that does not require an installation of Windows Server
Indicate whether the statement is true or false