Which of the following computing techniques will limit the vulnerability of a system to infection by a virus? (Select TWO).

A. Install a NAT firewall on the network
B. Run an online malware scan monthly
C. Only open email from recognized senders
D. Update antivirus signatures on a daily basis
E. Automatically update the operating system


Answer:
D. Update antivirus signatures on a daily basis
E. Automatically update the operating system

Computer Science & Information Technology

You might also like to view...

In the Clock application, you have a(n) ____ loop display the number of minutes.

A. outer B. control C. nested D. master

Computer Science & Information Technology

Provide examples of data mining applications.

What will be an ideal response?

Computer Science & Information Technology

The logic for the stack top is virtually identical to that for the pop stack except for the delete logic.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

What type of address is a link-local address?

A. Multicast B. Unicast C. Broadcast D. Stateful

Computer Science & Information Technology