A ________ is a type of malware that is attached to a host file and has the ability to replicate, or copy, itself.
A. worm
B. zombie
C. Trojan horse
D. virus
Answer: D
You might also like to view...
Which are the following items are valid advantages for having a dedicated forensics department in a corporate environment?
a. You are able to control e-discovery requests on your own terms. b. Risks of non-compliance or unsatisfactory response resulting from reliance on improperly trained personnel is significantly reduced. c. Eliminating third-party access to private or privileged information significantly reduces the organization’s exposure to threat. d. You have control over what documents are released based on any given demand.
Some physical models have serious moral and ethical consequences.
Answer the following statement true (T) or false (F)
The information security technician wants to ensure security controls are deployed and functioning as intended to be able to maintain an appropriate security posture. Which of the following security techniques is MOST appropriate to do this?
A. Log audits B. System hardening C. Use IPS/IDS D. Continuous security monitoring
An ItemEvent is generated when the mouse is clicked on a ____.
A. JCheckBox B. JButton C. JRadioButton D. JMenuItem