Malware that changes its binary pattern on specific dates at specific times to avoid detection is known as a (n):

A. armored virus
B. logic bomb
C. polymorphic virus
D. Trojan


Answer: C. polymorphic virus

Computer Science & Information Technology

You might also like to view...

In the figure above, the item numbered 1 indicates the ____.

A. XML parser B. DTD C. XML prolog D. XML application

Computer Science & Information Technology

Include all of the following when you turn your computer over to a refurbisher except ______ .

A. your data files after backing them up B. the keyboard and mouse C. other peripherals D. your original documentation

Computer Science & Information Technology

The ____________________ bootloader is a very flexible bootloader that can be used to launch just about any system from a computer's hard drive.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Briefly distinguish between OR logic and exclusive OR logic for two inputs.

What will be an ideal response?

Computer Science & Information Technology