How is heuristic scanning similar to signature-scanning?
a) It is susceptible to false reporting.
b) It can detect viruses that have not yet been identified.
c) It searches for common virus behavior.
d) all of the above
a) It is susceptible to false reporting.
You might also like to view...
Explain why it is a good idea to use the background color, even if you have a background image.
What will be an ideal response?
Two of the more commonly used date functions are the ________ and ________ functions
A) DateSerial, DatePart B) Date, DatePart C) Today, Date D) Date, Now
Human-computer interaction (HCI) describes the relationship between computers and the people who use them to perform their jobs.
Answer the following statement true (T) or false (F)
A security analyst is hardening an authentication server. One of the primary requirements is to ensure there is mutual authentication and delegation. Given these requirements, which of the following technologies should the analyst recommend and configure?
A. LDAP services B. Kerberos services C. NTLM services D. CHAP services