Correct Answer
verified
Multiple Choice
A) W32/Netsky-P
B) Troj/Invo-Zip
C) MacDefender
D) None of the above
Correct Answer
verified
Multiple Choice
A) Virus
B) Worm
C) Trojan horse
D) None of the above
Correct Answer
verified
Multiple Choice
A) It is so ubiquitous.
B) It is designed so that legitimate programmers can access its internal objects.
C) It contains virus programming tools.
D) None of the above.
Correct Answer
verified
Multiple Choice
A) Buffer-overflow
B) RAM
C) Spyware
D) Adware
Correct Answer
verified
Showing 21 - 25 of 25
Related Exams