The Chief Information Officer (CIO) wants to protect laptop users from zero day attacks. Which of the following would BEST achieve the CIO's goal?

A. Host based firewall
B. Host based IDS
C. Anti-virus
D. Anti-spyware


Answer: A. Host based firewall

Computer Science & Information Technology

You might also like to view...

A scheduling mechanism that requires no prior knowledge of process length, yet can nevertheless favor shorter jobs, is known as the __________ scheduling mechanism.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Programs translated and executed line by line from the source code are said to be ____.

A. compiled B. validated C. interpreted D. instantiated

Computer Science & Information Technology

What is the life span of a memory card? Include the guidelines for care of memory cards.

What will be an ideal response?

Computer Science & Information Technology

A ________ area network is a type of wireless network that works within your immediate surroundings to connect cell phones to headsets, controllers to game systems, and so on.

A. wide B. personal C. local D. gateway

Computer Science & Information Technology