0 votes
in Technology by (321k points)
edited by
Preventing users from accessing known dangerous locations on the internet, plugging in uncontrolled devices to their computer comes under __________.

1) Attack Remediation

2) preventing the exploitation of known and unknown vulnerabilities

3) Attack surface reduction

4) Detection and prevention of deployment of malicious exploitables

1 Answer

0 votes
by (321k points)
their computer comes under __________.

Attack Remediation

preventing the exploitation of known and unknown vulnerabilities

Attack surface reduction

Detection and prevention of deployment of malicious exploitables
...