Which virus scanning technique uses rules to determine if a file or program is behaving like a virus?
A) Heuristic scanning
B) Active code scanning
C) Instant messaging scanning
D) Email and attachment scanning
A) Heuristic scanning
Computer Science & Information Technology
You might also like to view...
What tool is best suited to combine multiple versions of a shared workbook into one document?
A) Combine B) Merge C) Concatenate D) Compare and Merge
Computer Science & Information Technology
Which MEF service type acts like a traditional Ethernet network?
A) E-LAN B) E-Tree C) E-Mesh D) E-Line
Computer Science & Information Technology