The most effective countermeasure for malware is:
a. Rootkit detection
b. Decreasing user privilege levels
c. Anti-virus
d. Firewalls
b. Decreasing user privilege levels
Computer Science & Information Technology
You might also like to view...
Which of the following items is not commonly added to a blog for use by its readers?
a. Comments option b. Editing tools c. Archive d. Subscription links
Computer Science & Information Technology
VMware Workstation 12 is only compatible with VMware Fusion version 9 or later.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology