What is a split infection?
What will be an ideal response?
One of the more sophisticated types of virus uses a split infection, which divides the malicious code itself into several parts (along with one main body of code), and then these parts are placed at random positions throughout the program code. To make detection even more difficult, these parts may contain unnecessary "garbage" code to mask their true purpose.
You might also like to view...
If you make changes within a table and use the Apply to choice to Table instead of Cell, the changes made will apply to:
A) the current column. B) the current row. C) the current table. D) the current cell.
You have a very large hard disk that is 1 TB. You want to organize your data into ten volumes on this disk. Your system is running Windows 10. What can you do to accommodate this?
A. use a basic disk scheme and create 10 primary partitions B. use a dynamic disk scheme and create an extended partition and 10 logical drives C. use the UDF file system and create 10 volume mount points D. use a dynamic disk scheme and create 10 volumes