The Chief Information Officer (CIO) wants to protect laptop users from zero day attacks. Which of the following would BEST achieve the CIO's goal?
A. Host based firewall
B. Host based IDS
C. Anti-virus
D. Anti-spyware
Answer: A. Host based firewall
You might also like to view...
A scheduling mechanism that requires no prior knowledge of process length, yet can nevertheless favor shorter jobs, is known as the __________ scheduling mechanism.
Fill in the blank(s) with the appropriate word(s).
Programs translated and executed line by line from the source code are said to be ____.
A. compiled B. validated C. interpreted D. instantiated
What is the life span of a memory card? Include the guidelines for care of memory cards.
What will be an ideal response?
A ________ area network is a type of wireless network that works within your immediate surroundings to connect cell phones to headsets, controllers to game systems, and so on.
A. wide B. personal C. local D. gateway