In addition to a hardware firewall that protects the network, each wireless device should have its own software firewall installed, sometimes known as a(n) ____.

A. antivirus firewall
B. antispyware software
C. patch software
D. personal firewall


Answer: D

Computer Science & Information Technology

You might also like to view...

The list sequence container does not

a. Efficiently implement insert and delete operations anywhere in the list. b. Use a doubly linked list. c. Support bidirectional iterators. d. Automatically sort inserted items.

Computer Science & Information Technology

What is used to facilitate the use of virtual machine dynamic memory?

A. The virtual hard disk associated with the virtual machine. B. A registry entry that enables sharing the host's page file with all guest machines. C. The virtualization features of the processor are used to overload and compress the amount of physical RAM needed for the dynamic memory. D. The smart paging file, which is normally located in the same directory as the virtual machine configuration files.

Computer Science & Information Technology

Only the most complex databases have more than one table.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

When you have actions you must perform at the end of a try…catch sequence, you can use a ____ block.

A. finally B. catch C. throw D. try

Computer Science & Information Technology