Hi Guest

MobileUser

1 HomePage 1 Jobs 1 WalkIn 1Articles  

Cat Exam

 :) Latest Topic
AJAX
VB.NET
SQL Query
UDDI
CLASS
JavaScript Questions
SharePoint Interview
SilverLight
WCF
general knowledge
 ASP.NET
 :) Hot Jobs
 
 :) Latest Articles


  

 
Dhoti Patiyala


________ is a technique where attackers modify legitimate software to hide a malicious application.
Question Posted on 18 Feb 2022

Home >> Important Topics >> Endpoint Security >> ________ is a technique where attackers modify legitimate software to hide a malicious application.




________ is a technique where attackers modify legitimate software to hide a malicious application.
Choose the correct option from below list
(1)Wipers
(2)Weaponized documents
(3)Code caves
(4)Exploits

Answer:-(3)Code caves
0
0



 
 Input Your Comments Or suggestions(If Any)
 Name
 Email(optional)
 Comments


Other Important Questions
________ is the term that is used to refer to the method by which a malicious portable executable has reached an endpoint.
_______ is responsible for filtering the traffic flowing in and out of a network based on ‘a set of security rules’.
Which among the following usually refers to a cloud-based solution?
Which of the following are essential features to ensure data security?
Endpoint security solutions provide a decentralized solution to protect endpoints.






 
Top Searches:asp net questions vb net questions sql query uddl questions class javascript Questions sharepoint interview questions and concept silverlight questions and concept wcf questions beans general knowledge ajax questions
PHP | Biztalk | Testing | SAP | HR |