A. A trusted antivirus B. 24 hours scanning for virus C. Firewall to separate trusted and untrusted network D. Deny users access to websites which can potentially cause security leak
A. Create two domain trusted and untrusted domain B. Create strong policy in firewall to support different types of users C. Create a demilitarized zone D. Create two dmz zones with one untrusted domain
A. It is a tool to monitor file systems B. It is used to automatically take corrective action C. It is used to secure unix system D. None of the mentioned
A. It is a program which can be molded to do the desired task B. It is a program that is controlled or emulated section of os C. It is a special mode of antivirus D. None of the mentioned
A. Not to open software from unknown vendors B. Open and execute programs in admin level/root C. Open and execute programs in presence of antivirus D. None of the mentioned