Correct Answer: intercepting operating system read and write requests
Explanation:
Note: This Question is unanswered, help us to find answer for this one
Antispam And Antivirus Skill Assessment
Your Skill Level: Poor
Retake Quizzes to improve it
More Antispam And Antivirus MCQ Questions
Which of the following is true of a trojan virus?
Polymorphic viruses randomly generate which of the following items before infecting a new file?
Which of the following sites use disposable email addressing?
Which is not an example of a real life virus or worm discovered during the time period of 1980 to 2013?
When using greylist filtering, a message will be considered legitimate if it does which of the following?
A virus can hide itself from an antivirus software by doing which of the following?
Which of the following best describes a distributed antivirus tool that consist of a scanning client and a corresponding web service?
Most spyware is used to...
Which of the following differentiates a virus from a worm?
What is the difference between a worm and virus?