A technician has been asked by a manager to recommend a security solution for protecting a computer against worms. Which security technique should the technician recommend?
A technician has been asked by a manager to recommend a security solution for protecting a computer against worms. Which security technique should the technician recommend?