A(n) ________ is the portion of virus code that is unique to a particular computer virus

A) encryption code B) compression code C) virus pattern D) virus signature

D

Computer Science & Information Technology

You might also like to view...

An ________ can be created so that the data in XML files can be viewed on the Web

A) XML presentation file B) XML schema C) HTML presentation file D) HTML schema

Computer Science & Information Technology

What defines the method for identifying and authenticating users and the level of access that is granted to users?

A. Least privilege B. Dual controls C. Separation of duties D. Access control policy

Computer Science & Information Technology