_________ will integrate with the operating system of a host computer and monitor program behavior in real time for malicious actions.

A. Fingerprint-based scanners B. Behavior-blocking software

C. Generic decryption technology D. Heuristic scanners

B. Behavior-blocking software

Computer Science & Information Technology

You might also like to view...

To speed up searches, Windows maintains a(n) ________ that contains information about files located on your computer

Fill in the blank(s) with correct word

Computer Science & Information Technology

A narrow column used to display links and content of secondary importance is called a(n) nav.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology