Which of the following should a company deploy to prevent the execution of some types of malicious code?

A. Least privilege accounts
B. Host-based firewalls
C. Intrusion Detection systems
D. Application white listing

Answer: B. Host-based firewalls

Computer Science & Information Technology

You might also like to view...

Which of the following is NOT true about exporting presentations?

A) You can export one or more presentations as part of a package that can be copied to a CD so they can be viewed on most computers with or without PowerPoint installed. B) You can export presentations as handouts, which allow you to create Word documents with the slides and notes. C) Using the Save As tab on the File tab, you can also save the presentation in different types of file formats. D) You can export the presentation as a video with automatic timings to advance the slides to be displayed on computer monitors, projectors, mobile devices, or DVDs.

Computer Science & Information Technology

What does "I" in the ACID transaction model signify?

a. InnoDB b. INSERT c. isolation d. index

Computer Science & Information Technology