0 votes
in End Point Security by

Preventing users from accessing known dangerous locations on the internet, plugging in uncontrolled devices to their computer comes under __________.

Select the correct answer from below options:

a) Detection and prevention of deployment of 

b) malicious exploitables

c) preventing the exploitation of known and unknown vulnerabilities

d) Attack surface reduction

e) Attack Remediation

1 Answer

0 votes
by
d) Attack surface reduction

Preventing users from accessing known dangerous locations on the internet, plugging in uncontrolled devices to their computer comes under Attack surface reduction

Related questions

0 votes
asked Feb 16, 2022 in Digital Malware Analysis by sharadyadav1986
0 votes
asked Jun 7, 2023 in Azure by Robindeniel
...