Which of the following is an AV heuristic monitoring technique?

A. code emulation
B. environment scanning
C. code monitoring
D. OS simulation


Answer: A

Computer Science & Information Technology

You might also like to view...

Which of the following best defines packet filtering?

a. It implies that data rates are smoothed out. b. A limit is placed on the packets that can enter the network. c. It should be avoided when ACLs are used. d. A limit is not placed on the packets that can exit the network.

Computer Science & Information Technology

Which file action implements the principle of confidentiality from the CIA triad?

A. Compression B. Hash C. Backup D. Encryption

Computer Science & Information Technology

Which of the following positions the file pointer for a file that has been opened for reading and writing?

a. Use the size() member function on the file stream to position the file pointer. b. Use the seekp(arg) fstream member function with the number of records (counting the first record as 0) as argument to position the file pointer. c. Use the seekp(arg) fstream member function with the number of bytes to the record in question (counting the first byte as 0) as argument to position the file pointer. d. Use the sizeof operator to determine the number of bytes in the file stream.

Computer Science & Information Technology

Which of the following statements are correct for recursion?

a. Recursion is available only in the C and C++ languages. b. Recursion is available in all programming languages. c. Recursion is available in most modern programming languages, including C++. d. Recursion is a preprocessor technique e. Recursion, if used with care can be a useful programming technique.

Computer Science & Information Technology