Which of the following is not one of the four methods for classifying the various instances of malware by using the primary trait that the malware possesses?
A. Circulation
B. Infection
C. Concealment
D. Source
Answer: D
You might also like to view...
When an object, such as a String, is passed as an argument it is __________.
a. actually a reference to the object that is passed b. passed by value like any other parameter value c. encrypted d. necessary to know exactly how long the string is when writing the program
Which super class members are inherited by all sub classes of that super class?
a. private instance variables and methods. b. protected instance variables and methods. c. private constructors. d. protected constructors.
Which wildcard character is used to represent only one character?
A. Asterisk (*) B. Exclamation point (!) C. Question mark (?) D. Tilde (~)
Describe the three possible actions a Layer-2 switch may take depending on whether or not the destination MAC address is being recognized
What will be an ideal response?