What should you do to protect a system against Trojan horses?

A) Block all unused ports.
B) Keep antivirus software updated and properly configured.
C) Prevent active code running in the browser.
D) All of the above


D) All of the above

Computer Science & Information Technology

You might also like to view...

To catch an exception, the code that might throw the exception must be enclosed in a ________.

a. throws block. b. catch block. c. try block. d. finally block.

Computer Science & Information Technology

The list arrows next to each column name indicate that ________ is being used.

A. No Filter B. AutoFilter C. a network filter D. a custom filter

Computer Science & Information Technology

Which type of display would be most likely considered for a gaming PC design?

A) CRT B) CCFL C) LED D) CFET

Computer Science & Information Technology

What command-line interface command could create a file for a web page?

A) cf B) cp C) grep D) touch

Computer Science & Information Technology