Which is a virus infection mechanism that relies on a user to execute a file?
a. Master boot record infection
b. File infection
c. Macro infection
d. RAM resident infection
ANS: B
You might also like to view...
Which of the following is an accurate set of characteristics you would find in an attack signature?
A. IP address, attacker's alias, UDP options B. protocol options, TCP ports, region of origin C. IP address, TCP flags, port numbers D. IP number, MAC address, TCP options
Redraw the diagram created in number 3 above, after deleting the node containing Chicago.
What will be an ideal response?
Where do you go to perform a more targeted search?
A) Internet Explorer B) Search charm C) File Explorer D) Help
IPv6 uses eight 8-bit fields, each of which can be expressed as a hexadecimal number followed by a colon.
Answer the following statement true (T) or false (F)