A ________ is a type of malware that is attached to a host file and has the ability to replicate, or copy, itself.

A. worm
B. zombie
C. Trojan horse
D. virus


Answer: D

Computer Science & Information Technology

You might also like to view...

Which are the following items are valid advantages for having a dedicated forensics department in a corporate environment?

a. You are able to control e-discovery requests on your own terms. b. Risks of non-compliance or unsatisfactory response resulting from reliance on improperly trained personnel is significantly reduced. c. Eliminating third-party access to private or privileged information significantly reduces the organization’s exposure to threat. d. You have control over what documents are released based on any given demand.

Computer Science & Information Technology

Some physical models have serious moral and ethical consequences.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

The information security technician wants to ensure security controls are deployed and functioning as intended to be able to maintain an appropriate security posture. Which of the following security techniques is MOST appropriate to do this?

A. Log audits B. System hardening C. Use IPS/IDS D. Continuous security monitoring

Computer Science & Information Technology

An ItemEvent is generated when the mouse is clicked on a ____.

A. JCheckBox B. JButton C. JRadioButton D. JMenuItem

Computer Science & Information Technology