_____________is an application that is used for protection against malicious software.
Antivirus software
Malicious software
Programming software
None of these
Out of the following, which one will be altered or modified by a computer virus
Operating system
Speed of Network connectivity
Application software
All of these
A _____ is used to verify the authenticity of an electronic document.
Digital signature
Firewall
Encryption
___________ is the art and science of breaking cipher text.
Cryptanalysis
Cryptography
Cryptology
Which of the following backup methods copies files or folders without any compression?
Full
Differential
Incremental
Mirror