The most effective countermeasure for malware is:

a. Rootkit detection
b. Decreasing user privilege levels
c. Anti-virus
d. Firewalls


b. Decreasing user privilege levels

Computer Science & Information Technology

You might also like to view...

In Java, when you open a text file you should account for a possible:

a. FileNotFoundException b. FileFullException c. FileNotReadyException d. all of the above

Computer Science & Information Technology

A(n) ________ provides a graphical representation of numerical information

Fill in the blank(s) with correct word

Computer Science & Information Technology

In a table, a ________ contains all of the categories of data pertaining to one person, place, event, thing, or idea

A) foreign key B) primary key C) field D) record

Computer Science & Information Technology

Verification requires more matches against templates than does identification.

True False

Computer Science & Information Technology