Answer the following statements true (T) or false (F)
1. Malicious software aims to trick users into revealing sensitive personal information.
2. Keyware captures keystrokes on a compromised system.
3. Metamorphic code is software that can be shipped unchanged to a heterogeneous collection of platforms and execute with identical semantics.
4. A virus that attaches to an executable program can do anything that the program is permitted to do.
5. It is not possible to spread a virus via a USB stick.
1. TRUE
2. FALSE
3. FALSE
4. TRUE
5. FALSE
You might also like to view...
This device converts the electronic signal to an optical signal, and vice versa.
What will be an ideal response?
How does external fragmentation occur?
What will be an ideal response?
You must call most methods other than ________ explicitly to tell them to perform their tasks.
a. public methods b. main c. static methods d. private methods
________ are brief statements representing generalizations or advice.
A) Sayings B) Tales C) Customs D) Art forms