A virus attack is also known as a ________

A) logic bomb B) moneyload C) time bomb D) payload


D

Computer Science & Information Technology

You might also like to view...

During which type of DoS can the attacker use a transmitter to flood the airwaves in the vicinity of the wireless network?

a. Authentication flood attack b. Deauthentication flood attack c. Network jamming attack d. Equipment destruction attack

Computer Science & Information Technology

Panels are _________________________ when they display only their tab.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

In the number 3109, the 9 is referred to as the _________.

A. most significant digit B. least significant digit C. radix D. base

Computer Science & Information Technology

How is a crosstab query different from other queries?

A) You can only reference one object (table or query) as the data source B) You can use records from several objects in a crosstab query C) You can preview the data before finalizing the query D) You can select a data source with several grouping fields

Computer Science & Information Technology