Antivirus software can use techniques called__________ to detect malware by analyzing the characteristics and behavior of suspicious files.

A. heuristic analysis
B. virus signature
C. side-loading
D. port scan


Answer: A

Computer Science & Information Technology

You might also like to view...

What does each iteration of the insertion sort algorithm do?

Each iteration takes the next smallest element and inserts it at the beginning of the array. b. Each iteration takes the next element in the unsorted portion of the array and inserts it into the sorted portion. c. Sorted subarrays are inserted into the larger array. d. Each iteration determines the location of a pivot and inserts it into place.

Computer Science & Information Technology

ENCODEURL is a web function that returns ________

A) XML content B) a web page C) a URL-encoded string D) data from a web service

Computer Science & Information Technology

________ is architecture-neutral.

a. Java b. C++ c. C d. Ada e. Pascal

Computer Science & Information Technology

The _________ attack exploits the common use of a modular exponentiation algorithm in RSA encryption and decryption, but can be adapted to work with any implementation that does not run in fixed time.

A. mathematical B. timing C. chosen ciphertext D. brute-force

Computer Science & Information Technology