Professional Documents
Culture Documents
T
Subject:Security in computing
Paper Name: Security in computing
Paper Code: USIT602
7 If the virus executes, does its damage, and terminates until the next time
it is executed, it is known as a __________________
A nonresident virus
B stealth virus
C overwriting virus
D prepending virus
12 IPv4 uses ________ bit addresses while IPv6 uses _________ bit
addresses.
A 32, 64
B 32, 128
C 64, 128
D 128, 256