____________________ software examines the files stored on a disk to determine whether they are infected with a virus, and then destroys or disinfects them.

Fill in the blank(s) with the appropriate word(s).


Virus detection

Computer Science & Information Technology

You might also like to view...

A _________ is a fixed length block of main memory.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

In a ____ attack, the attacker sends a large number of connection or information requests to a target in an attempt to overwhelm its capacity and make it unavailable for legitimate users.

A. man-in-the-middle B. sniffer C. dictionary D. denial-of-service (DoS)

Computer Science & Information Technology

Which of the following is used to replicate attacks during a vulnerability assessment by providing a structure of exploits and monitoring tools?

A. replication image B. assessment image C. penetration framework D. exploitation framework

Computer Science & Information Technology

Public metrics are usedA) to evaluate the performance of software development teams B) to appraise the performance of individual team membersC) to make strategic changes to the software processD) to make tactical changes during a software project

What will be an ideal response?

Computer Science & Information Technology