in Technology by (1.8m points)
edited by
Preventing users from accessing known dangerous locations on the internet, plugging in uncontrolled devices to their computer comes under __________.

1) Attack Remediation

2) preventing the exploitation of known and unknown vulnerabilities

3) Attack surface reduction

4) Detection and prevention of deployment of malicious exploitables

1 Answer

0 votes
by (1.8m points)
their computer comes under __________.

Attack Remediation

preventing the exploitation of known and unknown vulnerabilities

Attack surface reduction

Detection and prevention of deployment of malicious exploitables

Related questions

0 votes
asked 5 days ago in Education by JackTerrance (1.8m points)
...