WhichofthefollowingtechnologiescanbeusedasameanstoisolateahostOSfromsometypesofsecuritythreats?()A.IntrusiondetectionB.VirtualizationC.KitingD.Cloning
题目
WhichofthefollowingtechnologiescanbeusedasameanstoisolateahostOSfromsometypesofsecuritythreats?()
A.Intrusiondetection
B.Virtualization
C.Kiting
D.Cloning
相似考题