A software ________ blocks access to an individual computer

A) firewall B) keylogger C) rootkit D) Trojan horse

A

Computer Science & Information Technology

You might also like to view...

A compilation of sources cited in a report and listed on a separate page is a(n) ________

Fill in the blank(s) with correct word

Computer Science & Information Technology

Which protocol is represented by the packet capture below? UDP 0.0.0.0:68 -> 255.255.255.255:67

A. DHCP B. FTP C. SNMP D. DNS

Computer Science & Information Technology