WhichofthefollowingtechnologiescanbeusedasameanstoisolateahostOSfromsometypesofsecuritythreats?() A.IntrusiondetectionB.VirtualizationC.KitingD.Cloning

WhichofthefollowingtechnologiescanbeusedasameanstoisolateahostOSfromsometypesofsecuritythreats?()

A.Intrusiondetection

B.Virtualization

C.Kiting

D.Cloning


相关考题: