Which of the following virus types infects your computer by running a program that searches for common types of data files (such as a Microsoft file) and compresses them using a complex encryption key that renders your files unusable?

A) Stealth
B) Macro
C) Polymorphic
D) Encryption


D

Computer Science & Information Technology

You might also like to view...

Name the five descriptive properties associated with each data variable in C++.

What will be an ideal response?

Computer Science & Information Technology

What are the steps to develop a secure OS?

What will be an ideal response?

Computer Science & Information Technology

When the same word is used in multiple locations or a word is used that was not quite appropriate, a thesaurus can be used to look up a(n) _____, or a word similar in meaning.

A. synonym B. homonym C. antonym D. metronym

Computer Science & Information Technology

What technique can a programmer use when he is trying to find the minimum or maximum value in an array?

What will be an ideal response?

Computer Science & Information Technology