Home
Recent Q&A
Java
Cloud
JavaScript
Python
SQL
PHP
HTML
C++
Data Science
DBMS
Devops
Hadoop
Machine Learning
Ask a Question
Data files containing detection and/or remediation code that antivirus or antispyware products use to identify malware is known as ___________.
Home
Digital Malware Analysis
Data files containing detection and/or remediation code that antivirus or antispyware products use...
asked
Feb 16, 2022
in
Digital Malware Analysis
by
sharadyadav1986
Q:
Data files containing detection and/or remediation code that antivirus or antispyware products use to identify malware is known as ___________.
Select the correct option from below list
a)Signature files
b)Security logs
c)Repositories
d)Macros
data-files
1
Answer
0
votes
answered
Feb 16, 2022
by
sharadyadav1986
a)Signature files
Data files containing detection and/or remediation code that antivirus or antispyware products use to identify malware is known as Signature files
Related questions
0
votes
Q: The process by which malware avoids detection by changing the underlying code is known as polymorphism.
asked
Feb 16, 2022
in
Digital Malware Analysis
by
sharadyadav1986
digital-malware
malware
code-snippet
0
votes
Q: Type of malware that performs unwanted and harmful actions in disguise of a legitimate program is known as _________.
asked
Feb 16, 2022
in
Digital Malware Analysis
by
sharadyadav1986
malware-types
0
votes
Q: Malware that limits access to a computer system by locking the entire system down or encrypting files or until the user executes a requested action is called ________.
asked
Feb 16, 2022
in
Digital Malware Analysis
by
sharadyadav1986
spyware
malware
0
votes
Q: Any event containing two or more elements of the sample space is known as a ___________.
asked
Apr 23, 2022
in
Statistics and Probability Basics
by
sharadyadav1986
element
sample-space
0
votes
Q: Harmful programs utilized to disrupt computer operation, collect sensitive information or get access to private computer systems are generally known as ___________.
asked
Feb 16, 2022
in
Digital Malware Analysis
by
sharadyadav1986
harmful-programs
private-computer
0
votes
Q: In computer security, the component of the malware, which is responsible for performing malicious action is referred to as ___________.
asked
Feb 16, 2022
in
Digital Malware Analysis
by
sharadyadav1986
computer-security
malware
0
votes
Q: Malicious code activated by a specific event or when a specific condition is met is known as _________.
asked
Feb 16, 2022
in
Digital Malware Analysis
by
sharadyadav1986
malicious-code-activate
malicious-code
0
votes
Q: A computer program comprising a malicious segment that connects itself to an application program or other executable component is known as __________.
asked
Feb 16, 2022
in
Digital Malware Analysis
by
sharadyadav1986
malicious-segment
0
votes
Q: A type of assessment that is often performed in a sandbox-virtual environment to prevent malware from actually infecting production systems is known as _________.
asked
Apr 2, 2022
in
Cybersecurity Prologue
by
sharadyadav1986
cyber-security
0
votes
Q: In computer security, a component of the malware, which is responsible for performing malicious action is referred to as _________.
asked
Feb 16, 2022
in
Digital Malware Analysis
by
sharadyadav1986
computer-security
0
votes
Q: A type of Trojan installed through an exploit or an email attachment onto a PC is known as _____________.
asked
Feb 16, 2022
in
Digital Malware Analysis
by
sharadyadav1986
trojan
email-attachment
0
votes
Q: The type of malware that restricts access to the computer either by encrypting files on the hard drive or by displaying messages demanding a ransom is called __________.
asked
Dec 9, 2021
in
Cybersecurity Prologue
by
rajeshsharma
malware-access
0
votes
Q: A computer program carrying a malicious segment that joins itself to other executable component or an application program is called ___________.
asked
Feb 16, 2022
in
Digital Malware Analysis
by
sharadyadav1986
malicious-segment
+1
vote
Q: __________ is the problem of identifying a category to which a new observation belongs to, based on a training set of data containing observations whose categories are already known.
asked
Jan 23, 2020
in
Data Science
by
AdilsonLima
+1
vote
Q: __________ is the problem of identifying a category to which a new observation belongs to, based on a training set of data containing observations whose categories are already known.
asked
Jan 16, 2020
in
Data Science
by
rahuljain1
#data-classification
0
votes
Q: ______ is a blob of metadata or a file containing metadata of a group of accompanying files.
asked
Oct 28, 2021
in
Cloud Foundry
by
john ganales
blob-metadata
0
votes
Q: Dynamic malware analysis doesn’t need a lab set-up to run malware samples.
asked
Feb 16, 2022
in
Digital Malware Analysis
by
sharadyadav1986
dynamic-malware
malware-sample
0
votes
Q: An insurance product that pays out income to the holder at specified intervals usually after retirement is known as ___________
asked
Nov 3, 2020
in
Insurance
by
SakshiSharma
#insurance-product
+1
vote
Q: The capability of your build system to handle an increase in the amount of code that it integrates and analyzes is known as .
asked
Jun 26, 2019
in
Continuous Deployment
by
SakshiSharma
#continousintegration
#continuous-deployment
#continuous-deployment-open-source
#continuous-deployment-software
0
votes
Q: Which of the following options are the common phases of malware analysis?
asked
Feb 16, 2022
in
Digital Malware Analysis
by
sharadyadav1986
malware-analysis
...