Which of the following computing techniques will limit the vulnerability of a system to infection by a virus? (Select TWO)

Which of the following computing techniques will limit the vulnerability of a system to infection by a virus? (Select TWO).

Which of the following computing techniques will limit the vulnerability of a system to infection by a virus? (Select TWO).

A.
Install a NAT firewall on the network

B.
Run an online malware scan monthly

C.
Only open email from recognized senders

D.
Update antivirus signatures on a daily basis

E.
Automatically update the operating system



Leave a Reply 0

Your email address will not be published. Required fields are marked *