List five different categories of utility tools support agents find useful to provide greater security for end users.
What will be an ideal response?
Any five of the following:
anti-virus utility
spyware utility
Internet security monitor
rootkit utility
password guesser
secure erase
You might also like to view...
Structured English can be more complex if blocks of (instructions) are ________ within each other to show hierarchy.
A) nested B) grouped C) selected D) placed
A ________ is person who reports a business that is engaged in an illegal activity or an unethical act to a regulatory agency
A) hacker B) whistle-blower C) spammer D) cyberbully
A program that uninstalls a specific malware program is called a(n):
A) Malware tool B) Defender tool C) Defense tool D) Removal tool
A ________ is used to copy the contents of one cell to another
A) function B) reference C) fill handle D) formula