A ____ virus is a common type of virus that is programmed into an attached macro file.?
A. ?boot sector
B. ?macro
C. ?polymorphic
D. ?file infector
Answer: B
You might also like to view...
Suppose you want to program behavior that repeats as long as some condition does not occur. To do this, you could use a statement with the following format: ____.
A. doWHILE (true) B. while (!true) C. if (NOT condition) D. while (&& false)
What information is returned by executing the command SELECT @@VERSION?
What will be an ideal response?
A strategy based on the concept of defense in depth is likely to include intrusion detection systems, active vulnerability scanners, passive vulnerability scanners, automated log analyzers, and protocol analyzers.
Answer the following statement true (T) or false (F)
The National Association of Corporate Directors (NACD) recommends four essential practices for boards of directors. Which of the following is NOT one of these recommended practices?
A. Hold regular meetings with the CIO to discuss tactical InfoSec planning. B. Assign InfoSec to a key committee and ensure adequate support for that committee. C. Ensure the effectiveness of the corporation's InfoSec policy through review and approval. D. Identify InfoSec leaders, hold them accountable, and ensure support for them.