Which antivirus technique compares the beginning and end of executable files against a list of known virus signatures?
a. Signature scanning
b. Heuristic scanning
c. Integrity checking
d. Activity blocking
ANS: A
You might also like to view...
An Exit effect ________
A) shrinks or grows the text B) brings a slide element onto the screen C) spirals an object off the slide D) emphasizes text that is displayed
In most client-server applications, the port number of a server is a well-known number (e.g., an FTP server uses port number 21, the Telnet server uses port number 23, etc.), while the client uses a currently available (ephemeral) port number. DHCP is different. Here, both the client and the server use a well-known port: UDP port 67 for the DHCP server and UDP port 68 for the DHCP client. Refer to RFC 2131 and provide an explanation for this protocol design choice.
What will be an ideal response?