_____________ software shields certain applications against behaviors commonly exhibited by intrusions.
A. Malware
B. Rootkit
C. Antivirus
D. Virus signature
Answer: C
Computer Science & Information Technology
You might also like to view...
Which of the following is NOT considered metadata?
a. the data type b. table name c. field name d. field size
Computer Science & Information Technology
Changes made to an outline while in Outline View are immediately displayed in the Slide pane
Indicate whether the statement is true or false
Computer Science & Information Technology
Which of the following is a form of input validation that looks for allowable characters or patterns and only allows those?
A. blacklisting B clipping levels C. whitelisting D. traffic policing
Computer Science & Information Technology
_________ code is freely available and can be used, distributed, or modified by anyone.
A. Public domain B. Open source C. Free code D. Dynamic
Computer Science & Information Technology