What is the best option to use to isolate an operating system?
A. Host-based intrusion detection system
B. Network-based intrusion detection system
C. Antivirus software
D. Virtualization software
D. Virtualization software should be used to isolate operating systems from attacks and other types of threats. The other three answers help to protect an operating system but do not isolate it completely.
You might also like to view...
The ____________________ logical operator specifies that the record will be selected if any one of the rows of criteria is true.
Fill in the blank(s) with the appropriate word(s).
________ software protects your computer from computer viruses
Fill in the blank(s) with correct word
The Internet is a great source of information that attackers can use to do reconnaissance of the target
Indicate whether the statement is true or false.
A server-side ____________________ language program processes data that is transmitted from a form to a server.
Fill in the blank(s) with the appropriate word(s).