Countermeasures for malware are generally known as _________ mechanisms because they were first developed to specifically target virus infections.

Fill in the blank(s) with the appropriate word(s).


anti-virus

Computer Science & Information Technology

You might also like to view...

What is the first line of defense against viruses and worms?

a. A personal firewall b. The Mac OS X operating system c. Antivirus software d. The Linux operating system

Computer Science & Information Technology

An object is instantiated from a(n) ____________________.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

You can use the properties of the ____ object to check whether a browser is compatible with standard DHTML.

A. Navigator B. Sniffer C. Checker D. Window

Computer Science & Information Technology

Joe received a digitally signed message from Grace What cryptographic key should he use to verify that digital signature?

a. Grace's public key b. Grace's private key c. Joe's public key d. Joe's private key

Computer Science & Information Technology