What is the best option to use to isolate an operating system?
A. Host-based intrusion detection system
B. Network-based intrusion detection system
C. Antivirus software
D. Virtualization software
D. Virtualization software should be used to isolate operating systems from attacks and other types of threats. The other three answers help to protect an operating system but do not isolate it completely.
Computer Science & Information Technology
You might also like to view...
An Excel function that looks up values that are displayed vertically in a column is the:
A. HLOOKUP function B. VLOOKUP C. Autosum
Computer Science & Information Technology
In Office 2013, Excel files are saved with ____ extensions.
A. .xlsx B. .docx C. .exlx D. .excl
Computer Science & Information Technology