Countermeasures for malware are generally known as _________ mechanisms because they were first developed to specifically target virus infections.
Fill in the blank(s) with the appropriate word(s).
anti-virus
Computer Science & Information Technology
You might also like to view...
What is the first line of defense against viruses and worms?
a. A personal firewall b. The Mac OS X operating system c. Antivirus software d. The Linux operating system
Computer Science & Information Technology
An object is instantiated from a(n) ____________________.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology
You can use the properties of the ____ object to check whether a browser is compatible with standard DHTML.
A. Navigator B. Sniffer C. Checker D. Window
Computer Science & Information Technology
Joe received a digitally signed message from Grace What cryptographic key should he use to verify that digital signature?
a. Grace's public key b. Grace's private key c. Joe's public key d. Joe's private key
Computer Science & Information Technology