Home
Recent Q&A
Java
Cloud
JavaScript
Python
SQL
PHP
HTML
C++
Data Science
DBMS
Devops
Hadoop
Machine Learning
Azure
Blockchain
Devops
Ask a Question
Data files containing detection and/or remediation code that antivirus or antispyware products use to identify malware is known as ___________.
Home
Digital Malware Analysis
Data files containing detection and/or remediation code that antivirus or antispyware products use...
0
votes
asked
Feb 16, 2022
in
Digital Malware Analysis
by
sharadyadav1986
Data files containing detection and/or remediation code that antivirus or antispyware products use to identify malware is known as ___________.
Select the correct option from below list
a)Signature files
b)Security logs
c)Repositories
d)Macros
data-files
Please
log in
or
register
to answer this question.
1
Answer
0
votes
answered
Feb 16, 2022
by
sharadyadav1986
a)Signature files
Data files containing detection and/or remediation code that antivirus or antispyware products use to identify malware is known as Signature files
Your comment on this answer:
Email me at this address if a comment is added after mine:
Email me if a comment is added after mine
Privacy: Your email address will only be used for sending these notifications.
Related questions
0
votes
Q: The process by which malware avoids detection by changing the underlying code is known as polymorphism.
asked
Feb 16, 2022
in
Digital Malware Analysis
by
sharadyadav1986
digital-malware
malware
code-snippet
0
votes
Q: Type of malware that performs unwanted and harmful actions in disguise of a legitimate program is known as _________.
asked
Feb 16, 2022
in
Digital Malware Analysis
by
sharadyadav1986
malware-types
0
votes
Q: Malware that limits access to a computer system by locking the entire system down or encrypting files or until the user executes a requested action is called ________.
asked
Feb 16, 2022
in
Digital Malware Analysis
by
sharadyadav1986
spyware
malware
+1
vote
Q: Any event containing two or more elements of the sample space is known as a ___________.
asked
Apr 23, 2022
in
Statistics and Probability Basics
by
sharadyadav1986
element
sample-space
0
votes
Q: Harmful programs utilized to disrupt computer operation, collect sensitive information or get access to private computer systems are generally known as ___________.
asked
Feb 16, 2022
in
Digital Malware Analysis
by
sharadyadav1986
harmful-programs
private-computer
0
votes
Q: In computer security, the component of the malware, which is responsible for performing malicious action is referred to as ___________.
asked
Feb 16, 2022
in
Digital Malware Analysis
by
sharadyadav1986
computer-security
malware
0
votes
Q: Malicious code activated by a specific event or when a specific condition is met is known as _________.
asked
Feb 16, 2022
in
Digital Malware Analysis
by
sharadyadav1986
malicious-code-activate
malicious-code
0
votes
Q: A computer program comprising a malicious segment that connects itself to an application program or other executable component is known as __________.
asked
Feb 16, 2022
in
Digital Malware Analysis
by
sharadyadav1986
malicious-segment
0
votes
Q: A type of assessment that is often performed in a sandbox-virtual environment to prevent malware from actually infecting production systems is known as _________.
asked
Apr 2, 2022
in
Cybersecurity Prologue
by
sharadyadav1986
cyber-security
0
votes
Q: In computer security, a component of the malware, which is responsible for performing malicious action is referred to as _________.
asked
Feb 16, 2022
in
Digital Malware Analysis
by
sharadyadav1986
computer-security
...