Multiple Choice
What is the best approach to preventing systems from being exploited by a Trojan horse?
A) Anti-spam software.
B) High security firewalls.
C) Software scanners.
D) Technological and policy measures.
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q13: What is the purpose of spyware?<br>A)To manage
Q14: A Trojan horse that spreads malware is
Q15: What does adware do?<br>A)It creates popup advertising
Q16: Many believe that there are certain features
Q17: Which remote administration tool only operates on
Q19: Which is one of the most famous
Q20: A term for programs that attempt to
Q21: Which is probably the most frequent action
Q22: NetBus,Back Orifice and most similar Trojan horses
Q23: Which of the following is NOT an