Preventing users from accessing known dangerous locations on the internet, plugging in uncontrolled devices to their computer comes under __________.
Select the correct answer from below options:
a) Detection and prevention of deployment of
b) malicious exploitables
c) preventing the exploitation of known and unknown vulnerabilities
d) Attack surface reduction
e) Attack Remediation