A process that uses the spawn mechanism to strike system performance is called……
a) internal thief
b) worm
c) code stacker
d) none of these
The internal code of any software that will set of a malicious function when specified conditions are met, is called…..
a) logic bomb
b) trap door
c) code stacker
d) none of these
The pattern that can be used to identify a virus is known as……
a) stealth
b) virus signature
c) armored
d) none of these
Which one of the following is not an attack, but a search for vulnerabilities to attack?
a) denial of service
b) port scanning
c) memory access violation
d) dumpster diving
Multipartite viruses attack on……….
a) files
b) boot sector
c) memory
d) all of these
What does DMZ stand for?
a) design zone
b) drawing zone
c) demilitarizes zone
d) all of these