Which of the following is a kind of virus that attaches itself to files with extensions such as .com or .exe?
A) file virus
B) logic bomb
C) macro virus
D) multipartite virus
E) Trojan horse
Ans: A) file virus
Computer Science & Information Technology
You might also like to view...
Jill must create a report for an Access database, but is unfamiliar with creating reports in Access. Which Report tool should Jill use?
A) Report Wizard B) Report C) Report Design D) Report Blank
Computer Science & Information Technology
Within security perimeters the organization can establish security redundancies, each with differing levels of security, between which traffic must be screened. _________________________
Answer the following statement true (T) or false (F)
Computer Science & Information Technology