__________ will integrate with the operating system of a host computer and monitor program behavior in real time for malicious actions.

A. Fingerprint-based scanners
B. Behavior-blocking software
C. Generic decryption technology
D. Heuristic scanners


B. Behavior-blocking software

Computer Science & Information Technology

You might also like to view...

When two or more networks are connected together, this is called a(n) ____________________.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Which of the following should you use to test for bad splices and connector problems on fiber-optic cable?

A. multimeter B. OTDR C. continuity tester D. ohm meter

Computer Science & Information Technology

Combining audio, video, and still images to create a file that can be converted into a movie is a process known as ________

Fill in the blank(s) with correct word

Computer Science & Information Technology

The ________ function is used when the lookup_value argument checks the top row of the table_array

A) VLOOKUP B) TLOOKUP C) HLOOKUP D) RLOOKUP

Computer Science & Information Technology