Which of the following is a virus hoax?

A) Kedi RAT
B) Rombertik
C) Jdbgmgr
D) Linux.Encoder.1


C) Jdbgmgr

Computer Science & Information Technology

You might also like to view...

Any item in an array can be accessed using the array's handle, the item's ____, and the subscript operator ([]).

A. index B. dimension C. type D. name

Computer Science & Information Technology

What is the Office 365 tenant account and how is it used with Intune?

What will be an ideal response?

Computer Science & Information Technology

Which of the follow is NOT a Snipping Tool snip?

A) free-form B) rectangular C) window D) circular

Computer Science & Information Technology

Which of the following is a self-contained program that may spread functional copies of itself to other computer systems?

a. Trojan horse b. malware c. worm d. logic bomb

Computer Science & Information Technology