1.

Preventing users from accessing known dangerous locations on the internet, plugging in uncontrolled devices to their computer comes under __________.

Answer»

Preventing users from accessing known dangerous locations on the internet, plugging in uncontrolled devices to their computer comes under __________.
CHOOSE the correct option from below LIST
(1)Detection and PREVENTION of deployment of (2)malicious exploitables
(3)preventing the EXPLOITATION of known and unknown vulnerabilities
(4)Attack surface REDUCTION
(5)Attack Remediation

Answer:-(4)Attack surface reduction



Discussion

No Comment Found