Which of the following virus types infects your computer by running a program that searches for common types of data files (such as a Microsoft file) and compresses them using a complex encryption key that renders your files unusable?
A) Stealth
B) Macro
C) Polymorphic
D) Encryption
D
Computer Science & Information Technology
You might also like to view...
Name the five descriptive properties associated with each data variable in C++.
What will be an ideal response?
Computer Science & Information Technology
What are the steps to develop a secure OS?
What will be an ideal response?
Computer Science & Information Technology
When the same word is used in multiple locations or a word is used that was not quite appropriate, a thesaurus can be used to look up a(n) _____, or a word similar in meaning.
A. synonym B. homonym C. antonym D. metronym
Computer Science & Information Technology
What technique can a programmer use when he is trying to find the minimum or maximum value in an array?
What will be an ideal response?
Computer Science & Information Technology