Which antivirus technique builds a database of hashed values and compares the scanned files against the hashes in the database?

a. Signature scanning
b. Heuristic scanning
c. Integrity checking
d. Activity blocking


ANS: C

Computer Science & Information Technology

You might also like to view...

Answer the following statements true (T) or false (F)

1. OOP is an acronym that means Object Oriented Programming. 2. C++ not only supports OOP but also supports other programming styles. 3. The namespace facility is a tool used that assists in the study of genealogy. 4. In C++ the variables Alpha, ALPHA and AlphA are the same identifier. 5. In C++ the compiler will infer the type intended for a variable from the context in which the variable occurs.

Computer Science & Information Technology

The Administrator and a user-specified initial account are called built-in accounts because they are created on every Windows 10 computer.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

In a function, arguments are included inside the parentheses following the function name

Indicate whether the statement is true or false

Computer Science & Information Technology

Cisco controllers support a maximum of ________ WLANs, but only ________ of them can be actively configured on an AP.

A) 16, 5 B) 512, 16 C) 100, 50 D) 100, 5

Computer Science & Information Technology