Multiple Choice
The ideal solution to the threat of malware is __________.
A) identification
B) removal
C) detection
D) prevention
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q3: Many forms of infection can be blocked
Q34: A program that is covertly inserted into
Q35: A Trojan horse is an apparently useful
Q37: Unsolicited bulk e-mail is referred to as
Q38: A virus that attaches to an executable
Q40: _ is malware that encrypts the user's
Q41: Sometimes referred to as the "infection vector",
Q42: _ code refers to programs that can
Q43: A _ is when a user views
Q44: Because _ software can block suspicious software