Which virus scanning technique uses rules to determine if a file or program is behaving like a virus?

A) Heuristic scanning
B) Active code scanning
C) Instant messaging scanning
D) Email and attachment scanning

A) Heuristic scanning

Computer Science & Information Technology

You might also like to view...

What tool is best suited to combine multiple versions of a shared workbook into one document?

A) Combine B) Merge C) Concatenate D) Compare and Merge

Computer Science & Information Technology

Which MEF service type acts like a traditional Ethernet network?

A) E-LAN B) E-Tree C) E-Mesh D) E-Line

Computer Science & Information Technology