找考题网-背景图
单项选择题

A.Intrusion detectionB.VirtualizationC.KitingD.CloningW……

Which of the following technologies can be used as a means to isolate a host OS from some types of security threats?()

A.Intrusion detection
B.Virtualization
C.Kiting
D.Cloning