Antivirus software can use techniques called__________ to detect malware by analyzing the characteristics and behavior of suspicious files.
A. heuristic analysis
B. virus signature
C. side-loading
D. port scan
Answer: A
You might also like to view...
What does each iteration of the insertion sort algorithm do?
Each iteration takes the next smallest element and inserts it at the beginning of the array. b. Each iteration takes the next element in the unsorted portion of the array and inserts it into the sorted portion. c. Sorted subarrays are inserted into the larger array. d. Each iteration determines the location of a pivot and inserts it into place.
ENCODEURL is a web function that returns ________
A) XML content B) a web page C) a URL-encoded string D) data from a web service
________ is architecture-neutral.
a. Java b. C++ c. C d. Ada e. Pascal
The _________ attack exploits the common use of a modular exponentiation algorithm in RSA encryption and decryption, but can be adapted to work with any implementation that does not run in fixed time.
A. mathematical B. timing C. chosen ciphertext D. brute-force