Malware is another term for ____ and refers to any computer program designed to surreptitiously enter a computer, gain unauthorized access to data, or disrupt normal processing operations.
A. malicious software
B. virus signatures
C. corrupted files
D. backup utilities
Answer: A
You might also like to view...
XML is ________
A) Excel's version of HTML B) a method to format documents for web browser display C) a method to structure data that's usable industry wide D) a series of user defined markers
This is the secure counterpart of HTTP.
A. SSL B. HTTPS C. Telnet D. RSH
The practice in which an African American assumes the identity of a white person in order to take advantage of the privileges and opportunities associated with being American can has been called:
A. Segregation B. Assimilation C. Integration D. Passing
A network administrator is adding 24 - 802.3af class 2 VoIP phones and needs to purchase a single PoE switch to power the phones. Which of the following is the MINIMUM PoE dedicated wattage the switch supports to power all of the phones at full power?
A. 96W B. 168W C. 240W D. 369.6W