_________ will integrate with the operating system of a host computer and monitor program behavior in real time for malicious actions.
A. Fingerprint-based scanners B. Behavior-blocking software
C. Generic decryption technology D. Heuristic scanners
B. Behavior-blocking software
Computer Science & Information Technology
You might also like to view...
To speed up searches, Windows maintains a(n) ________ that contains information about files located on your computer
Fill in the blank(s) with correct word
Computer Science & Information Technology
A narrow column used to display links and content of secondary importance is called a(n) nav.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology