Preventing users from accessing known dangerous locations on the internet, plugging in uncontrolled devices to their computer comes under __________.
1) Attack Remediation
2) preventing the exploitation of known and unknown vulnerabilities
3) Attack surface reduction
4) Detection and prevention of deployment of malicious exploitables