The most effective countermeasure for malware is:

a. Rootkit detection
b. Decreasing user privilege levels
c. Anti-virus
d. Firewalls

b. Decreasing user privilege levels

Computer Science & Information Technology

You might also like to view...

Which of the following items is not commonly added to a blog for use by its readers?

a. Comments option b. Editing tools c. Archive d. Subscription links

Computer Science & Information Technology

VMware Workstation 12 is only compatible with VMware Fusion version 9 or later.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology