Which of the following is a kind of virus that attaches itself to files with extensions such as .com or .exe?

A) file virus
B) logic bomb
C) macro virus
D) multipartite virus
E) Trojan horse

Ans: A) file virus

Computer Science & Information Technology

You might also like to view...

Jill must create a report for an Access database, but is unfamiliar with creating reports in Access. Which Report tool should Jill use?

A) Report Wizard B) Report C) Report Design D) Report Blank

Computer Science & Information Technology

Within security perimeters the organization can establish security redundancies, each with differing levels of security, between which traffic must be screened. _________________________

Answer the following statement true (T) or false (F)

Computer Science & Information Technology