Which antivirus technique examines computer files for irregular or unusual instructions?
a. Signature scanning
b. Heuristic scanning
c. Integrity checking
d. Activity blocking
ANS: B
You might also like to view...
What is the coding requirement(s) that a programmer must follow when writing virtual functions?
A. Must use “virtual” keyword in the parent class. B. The parent class must have specific implementation coded in the .cpp file. C. The base class must use a different name for the function than the parent class. D. There are no specific coding requirements for using the “virtual” keyword.
Which of the following is one of the tools on the court-approved lists issued by the Federal Judiciary?
a. Encase b. Sleuthkit c. FTK d. Paraben e. There is no list of court-approved tools.
A WLAN covers a large geographical area and is made up of many smaller networks.
Answer the following statement true (T) or false (F)
If you want a function to modify the value stored in a variable, how do you need to pass the variable?
A. by value B. by reference C. by invocation D. by parameter