____________________ software examines the files stored on a disk to determine whether they are infected with a virus, and then destroys or disinfects them.
Fill in the blank(s) with the appropriate word(s).
Virus detection
You might also like to view...
A _________ is a fixed length block of main memory.
Fill in the blank(s) with the appropriate word(s).
In a ____ attack, the attacker sends a large number of connection or information requests to a target in an attempt to overwhelm its capacity and make it unavailable for legitimate users.
A. man-in-the-middle B. sniffer C. dictionary D. denial-of-service (DoS)
Which of the following is used to replicate attacks during a vulnerability assessment by providing a structure of exploits and monitoring tools?
A. replication image B. assessment image C. penetration framework D. exploitation framework
Public metrics are usedA) to evaluate the performance of software development teams B) to appraise the performance of individual team membersC) to make strategic changes to the software processD) to make tactical changes during a software project
What will be an ideal response?