Which antivirus technique examines computer files for irregular or unusual instructions?

a. Signature scanning
b. Heuristic scanning
c. Integrity checking
d. Activity blocking


ANS: B

Computer Science & Information Technology

You might also like to view...

What is the coding requirement(s) that a programmer must follow when writing virtual functions?

A. Must use “virtual” keyword in the parent class. B. The parent class must have specific implementation coded in the .cpp file. C. The base class must use a different name for the function than the parent class. D. There are no specific coding requirements for using the “virtual” keyword.

Computer Science & Information Technology

Which of the following is one of the tools on the court-approved lists issued by the Federal Judiciary?

a. Encase b. Sleuthkit c. FTK d. Paraben e. There is no list of court-approved tools.

Computer Science & Information Technology

A WLAN covers a large geographical area and is made up of many smaller networks.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

If you want a function to modify the value stored in a variable, how do you need to pass the variable?

A. by value B. by reference C. by invocation D. by parameter

Computer Science & Information Technology