0 votes
in End Point Security by

Preventing users from accessing known dangerous locations on the internet, plugging in uncontrolled devices to their computer comes under __________.

Select the correct answer from below options:

a) Detection and prevention of deployment of 

b) malicious exploitables

c) preventing the exploitation of known and unknown vulnerabilities

d) Attack surface reduction

e) Attack Remediation

1 Answer

0 votes
by
d) Attack surface reduction

Preventing users from accessing known dangerous locations on the internet, plugging in uncontrolled devices to their computer comes under Attack surface reduction
...