0
their computer comes under __________.

Open 1 Answers 2186 Views Technology
Preventing users from accessing known dangerous locations on the internet, plugging in uncontrolled devices to their computer comes under __________.

1) Attack Remediation

2) preventing the exploitation of known and unknown vulnerabilities

3) Attack surface reduction

4) Detection and prevention of deployment of malicious exploitables

1 Answer

0
their computer comes under __________.

Attack Remediation

preventing the exploitation of known and unknown vulnerabilities

Attack surface reduction

Detection and prevention of deployment of malicious exploitables
by (236k points)
...