List five different categories of utility tools support agents find useful to provide greater security for end users.

What will be an ideal response?


Any five of the following:
anti-virus utility
spyware utility
Internet security monitor
rootkit utility
password guesser
secure erase

Computer Science & Information Technology

You might also like to view...

Structured English can be more complex if blocks of (instructions) are ________ within each other to show hierarchy.

A) nested B) grouped C) selected D) placed

Computer Science & Information Technology

A ________ is person who reports a business that is engaged in an illegal activity or an unethical act to a regulatory agency

A) hacker B) whistle-blower C) spammer D) cyberbully

Computer Science & Information Technology

A program that uninstalls a specific malware program is called a(n):

A) Malware tool B) Defender tool C) Defense tool D) Removal tool

Computer Science & Information Technology

A ________ is used to copy the contents of one cell to another

A) function B) reference C) fill handle D) formula

Computer Science & Information Technology