Which of the following is NOT a technique used to deal with malware?

A. anti-malware
B. patch management
C. training
D. wireless encryption


Answer: D

Computer Science & Information Technology

You might also like to view...

Which of the following is not a benefit of “goto-less programming”?

a. Easier to debug and modify b. Shorter c. Clearer d. More likely to be bug free

Computer Science & Information Technology

A memory stack contains the main program, and when another module is running, it is said to be placed, or ____ the memory stack until it is finished executing.

A. deposited onto B. pushed onto C. withdrawn from D. popped from

Computer Science & Information Technology

The tools used for gathering and measuring information about visitors to your website, such as how many visitors visit each page, how long do they stay on a page, and so on, are called _______________.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Excel provides tools that allow you to sort data in ascending order only.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology