Which of the following viruses is designed to infect multiple file types in an effort to fool the antivirus software that is looking for it?
A. multi-partite
B. polymorphic
C. stealth
D. encryption
Answer: A
You might also like to view...
When using mouse coordinates, (0, 0) is located in the:
a) bottom left b) bottom right c) top left d) top right
Using the basic model of an information system as presented in Figure 6.18, suggest the components that might be part of an app for a mobile device that displays information about flights arriving and departing from a particular airport.
What will be an ideal response?
To format a value, Excel uses the placeholders represent individual digits.?
Answer the following statement true (T) or false (F)
A technician observes another technician trying to steal a company laptop. Which of the following should the first technician do NEXT?
A. Confront the technician stealing the laptop B. Preserve the laptop for evidence C. Report through proper channels D. Document the incident