What is the best option to use to isolate an operating system?

A. Host-based intrusion detection system
B. Network-based intrusion detection system
C. Antivirus software
D. Virtualization software


D. Virtualization software should be used to isolate operating systems from attacks and other types of threats. The other three answers help to protect an operating system but do not isolate it completely.

Computer Science & Information Technology

You might also like to view...

The ____________________ logical operator specifies that the record will be selected if any one of the rows of criteria is true.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

________ software protects your computer from computer viruses

Fill in the blank(s) with correct word

Computer Science & Information Technology

The Internet is a great source of information that attackers can use to do reconnaissance of the target

Indicate whether the statement is true or false.

Computer Science & Information Technology

A server-side ____________________ language program processes data that is transmitted from a form to a server.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology