The virus scanning technique that uses rules to determine if a program behaves like a virus is _________ scanning
a. Download
b. File
c. Heuristic
d. Sandbox
Answer C. A new virus may not be on a virus definition list, so you must examine its behavior to determine if it is a virus.
Computer Science & Information Technology
You might also like to view...
In Excel, there are ________ types of trendlines
A) 2 B) 4 C) 5 D) 6
Computer Science & Information Technology
The prototypes of overloaded cast operator functions do not:
a. Specify the type they convert to. b. Specify the type that is being converted. c. Specify a return type. d. Need to be defined inside the class whose objects are being converted.
Computer Science & Information Technology