Answer the following statements true (T) or false (F)

1. Malicious software aims to trick users into revealing sensitive personal data.
2. Keyware captures keystrokes on a compromised system.
3. Metamorphic code is software that can be shipped unchanged to a
heterogeneous collection of platforms and execute with identical semantics.
4. A virus that attaches to an executable program can do anything that the
program is permitted to do.
5. It is not possible to spread a virus via a USB stick

1. True
2. False
3. False
4. True
5. True

Computer Science & Information Technology

You might also like to view...

The ________ is located at the bottom of the program window, contains information relative to the open file and is specific to each application

A) title bar B) status bar C) Quick Access Toolbar D) Dialog Box Launcher

Computer Science & Information Technology

The Resource Monitor utility can be started by typing resmon.exe at a command prompt.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology