Which one of the following is a good defense against worms?()
A.Differentiating systems along the lines exploited by the attack.
B.Placing limits on sharing, writing, and executing programs.
C.Keeping data objects small, simple, and obvious as to their intent.
D.Limiting connectivity by means of well-managed access controls.