WhichofthefollowingtechnologiescanbeusedasameanstoisolateahostOSfromsometypesofsecuritythreats?()A.IntrusiondetectionB.VirtualizationC.KitingD.Cloning

题目
WhichofthefollowingtechnologiescanbeusedasameanstoisolateahostOSfromsometypesofsecuritythreats?()

A.Intrusiondetection

B.Virtualization

C.Kiting

D.Cloning


相似考题