A software ________ blocks access to an individual computer
A) firewall B) keylogger C) rootkit D) Trojan horse
A
Computer Science & Information Technology
You might also like to view...
A compilation of sources cited in a report and listed on a separate page is a(n) ________
Fill in the blank(s) with correct word
Computer Science & Information Technology
Which protocol is represented by the packet capture below? UDP 0.0.0.0:68 -> 255.255.255.255:67
A. DHCP B. FTP C. SNMP D. DNS
Computer Science & Information Technology