Malware that changes its binary pattern on specific dates at specific times to avoid detection is known as a (n):
A. armored virus
B. logic bomb
C. polymorphic virus
D. Trojan
Answer: C. polymorphic virus
Computer Science & Information Technology
You might also like to view...
Which of the following is not a setting you can set in creating a style?
A) Alternate text B) Alignment C) Line spacing D) Shading
Computer Science & Information Technology
Which of the following is a type of attack that allows for untrusted data to be executed as a valid command?
a. Injection flaw attack b. Parameter/form tampering attack c. Invalidated input attack d. Hidden fields attack
Computer Science & Information Technology