The virus scanning technique that uses rules to determine if a program behaves like a virus is _________ scanning

a. Download
b. File
c. Heuristic
d. Sandbox

Answer C. A new virus may not be on a virus definition list, so you must examine its behavior to determine if it is a virus.

Computer Science & Information Technology

You might also like to view...

In Excel, there are ________ types of trendlines

A) 2 B) 4 C) 5 D) 6

Computer Science & Information Technology

The prototypes of overloaded cast operator functions do not:

a. Specify the type they convert to. b. Specify the type that is being converted. c. Specify a return type. d. Need to be defined inside the class whose objects are being converted.

Computer Science & Information Technology