Which of the following classifications of viruses can change its own code to avoid detection?

A. Stealth
B. Multipartite
C. Polymorphic
D. Worm


Answer: C

Computer Science & Information Technology

You might also like to view...

A peripheral device is linked to a computer through a(n) __________.

a. interface b. connection c. switch d. connector

Computer Science & Information Technology

Which term refers to the process of turning anything you can store in a PHP variable into a byte stream?

a. AJAX b. array c. concatenation d. serialization

Computer Science & Information Technology

There is no difference between batch processing an action and using the Image Processor dialog box.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Consider the following struct definition:  struct rectangleData{  double length;  double width;  double area;  double perimeter; };Which of the following variable declarations is correct?

A. rectangle rectangleData; B. struct rectangleData(); C. rectangleData myRectangle; D. rectangleData rectangle = new rectangleData();

Computer Science & Information Technology