_____________ software shields certain applications against behaviors commonly exhibited by intrusions.

A. Malware
B. Rootkit
C. Antivirus
D. Virus signature


Answer: C

Computer Science & Information Technology

You might also like to view...

Which of the following is NOT considered metadata?

a. the data type b. table name c. field name d. field size

Computer Science & Information Technology

Changes made to an outline while in Outline View are immediately displayed in the Slide pane

Indicate whether the statement is true or false

Computer Science & Information Technology

Which of the following is a form of input validation that looks for allowable characters or patterns and only allows those?

A. blacklisting B clipping levels C. whitelisting D. traffic policing

Computer Science & Information Technology

_________ code is freely available and can be used, distributed, or modified by anyone.

A. Public domain B. Open source C. Free code D. Dynamic

Computer Science & Information Technology