0 votes
in End Point Security by

Preventing users from accessing known dangerous locations on the internet, plugging in uncontrolled devices to their computer comes under __________.

Select the correct answer from below options:

a) Detection and prevention of deployment of 

b) malicious exploitables

c) preventing the exploitation of known and unknown vulnerabilities

d) Attack surface reduction

e) Attack Remediation

1 Answer

0 votes
by
d) Attack surface reduction

Preventing users from accessing known dangerous locations on the internet, plugging in uncontrolled devices to their computer comes under Attack surface reduction

Related questions

0 votes
asked Dec 11, 2021 in Microsoft Azure Administrator by Robindeniel
0 votes
asked Dec 19, 2021 in APIGEE - API Services by DavidAnderson
...