Multiple Choice
____ can perform many malicious acts, including damaging or destroying important files, opening backdoors for potential hackers, and sending sensitive information to others.
A) Viruses
B) Signatures
C) Logs
D) Infectors
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q61: Antivirus software uses data files, sometimes called
Q62: IS resource acquisition and deployment should occur
Q63: A vendor's response to an RFP is
Q64: The first step in stating hardware and
Q65: _ is the process of determining whether
Q67: A(n) _ is a server that handles
Q68: _ expenditures provide benefits only in the
Q69: Infrastructure management tends to concentrate on providing
Q70: The term _ refers to execution speed.
Q71: Protection against power loss requires a(n) _