Which of the following statements correctly describes the malware characteristic of polymorphism?

a. Polymorphic malware can change its characteristics every time it is transferred to a new system.
b. Polymorphic malware is designed to activate on a particular date, remaining harmless until that time.
c. Polymorphic malware is software that disguises itself as a legitimate program, or replaces a legitimate program's code with destructive code.
d. Polymorphic malware utilizes encryption to prevent detection.

ANSWER: a

Computer Science & Information Technology

You might also like to view...

Answer the following statements true (T) or false (F)

1. Register indirect addressing uses the same number of memory references as indirect addressing. 2. Three of the most common uses of stack addressing are relative addressing, base-register addressing, and indexing. 3. The method of calculating the EA is the same for both base-register addressing and indexing. 4. Typically an instruction set will include both preindexing and postindexing. 5. The x86 is equipped with a variety of addressing modes intended to allow the efficient execution of high-level languages.

Computer Science & Information Technology

In the analogy of building a house, ______ is like a blueprint and ______ is like the actual house built from the blueprint.

A. a class; an object B. an object; a class C. a method, a variable D. a variable, a method

Computer Science & Information Technology