Malware that changes its binary pattern on specific dates at specific times to avoid detection is known as a (n):

A. armored virus
B. logic bomb
C. polymorphic virus
D. Trojan

Answer: C. polymorphic virus

Computer Science & Information Technology

You might also like to view...

Which of the following is not a setting you can set in creating a style?

A) Alternate text B) Alignment C) Line spacing D) Shading

Computer Science & Information Technology

Which of the following is a type of attack that allows for untrusted data to be executed as a valid command?

a. Injection flaw attack b. Parameter/form tampering attack c. Invalidated input attack d. Hidden fields attack

Computer Science & Information Technology