A virus ______ is a known specific pattern of virus code that antivirus programs use to identify viruses.

A. designation
B. fingerprint
C. signature
D. impression


Answer: C

Computer Science & Information Technology

You might also like to view...

The Windows Vista tool that displays detailed information about significant events on your computer is called:

A) Event Calendar B) Event Analyzer C) Event Viewer D) Vista Events

Computer Science & Information Technology

An expression containing only integer values as operands is called a(n) ____ expression.

A. standard B. whole C. regular D. integer

Computer Science & Information Technology

____ balance, like the kind shown in the accompanying figure, is often more visually compelling than symmetrical balance because it better incorporates the white space on the canvas into the design.

a. Formal b. Radial c. Informal d. all of the above

Computer Science & Information Technology

A firewall technician has been instructed to disable all non-secure ports on a corporate firewall. The technician has blocked traffic on port 21, 69, 80, and 137-139. The technician has allowed traffic on ports 22 and 443. Which of the following correctly lists the protocols blocked and allowed?

A. Blocked: TFTP, HTTP, NetBIOS; Allowed: HTTPS, FTP B. Blocked: FTP, TFTP, HTTP, NetBIOS; Allowed: SFTP, SSH, SCP, HTTPS C. Blocked: SFTP, TFTP, HTTP, NetBIOS; Allowed: SSH, SCP, HTTPS D. Blocked: FTP, HTTP, HTTPS; Allowed: SFTP, SSH, SCP, NetBIOS

Computer Science & Information Technology