What should you do to protect a system against Trojan horses?
A) Block all unused ports.
B) Keep antivirus software updated and properly configured.
C) Prevent active code running in the browser.
D) All of the above
D) All of the above
Computer Science & Information Technology
You might also like to view...
To catch an exception, the code that might throw the exception must be enclosed in a ________.
a. throws block. b. catch block. c. try block. d. finally block.
Computer Science & Information Technology
The list arrows next to each column name indicate that ________ is being used.
A. No Filter B. AutoFilter C. a network filter D. a custom filter
Computer Science & Information Technology
Which type of display would be most likely considered for a gaming PC design?
A) CRT B) CCFL C) LED D) CFET
Computer Science & Information Technology
What command-line interface command could create a file for a web page?
A) cf B) cp C) grep D) touch
Computer Science & Information Technology