Which of the following computing techniques will limit the vulnerability of a system to infection by a virus? (Select TWO).
A. Install a NAT firewall on the network
B. Run an online malware scan monthly
C. Only open email from recognized senders
D. Update antivirus signatures on a daily basis
E. Automatically update the operating system
Answer:
D. Update antivirus signatures on a daily basis
E. Automatically update the operating system
You might also like to view...
In the Clock application, you have a(n) ____ loop display the number of minutes.
A. outer B. control C. nested D. master
Provide examples of data mining applications.
What will be an ideal response?
The logic for the stack top is virtually identical to that for the pop stack except for the delete logic.
Answer the following statement true (T) or false (F)
What type of address is a link-local address?
A. Multicast B. Unicast C. Broadcast D. Stateful