rahimmohammad646
rahimmohammad646 rahimmohammad646
  • 25-08-2020
  • Computers and Technology
contestada

Which of the following information security technology is used for avoiding browser-based hacking?
 Anti-malware in browsers

 Remote browser access

Adware remover in browsers

Incognito mode in a browser
​

Respuesta :

firaeholic
firaeholic firaeholic
  • 25-08-2020

Answer:

B

Explanation:

if you establishe a remote browsing by isolating the browsing session of end user.. you'll be safe

Answer Link

Otras preguntas

The title character in the novel Jane Eyre differs from other young pupils in her school because she refuses to be ___ to those in authority. A. compounded
What is two thirds of 24
3. Tasha reads 5 books every month. Which of the following expressions represents the number of books she will have read after M months? A M ÷ 5 B 5 × M C 5 ÷
The setting of a gothic work is characterized by?
24.6 feet by 14.8 feet
If the core of a supernova contains about one solar mass, the core will become a _____. protostar red dwarf white dwarf neutron star black hole
Darwinism IA a term used when referring to
What percent of 25 is 14
in a sale there is twenty five per cent off all prices a bed cost £33 in the sale how much was it before the sale ?
how did George Washington dress as president