Which of the following technologies can be used as a means to isolate a host OS from some types of security threats?
A.
Intrusion detection
B.
Virtualization
C.
Kiting
D.
Cloning
Which of the following technologies can be used as a means to isolate a host OS from some types of security threats?
Which of the following technologies can be used as a means to isolate a host OS from some types of security threats?
A.
Intrusion detection
B.
Virtualization
C.
Kiting
D.
Cloning