Preventing users from accessing known dangerous locations on the internet, plugging in uncontrolled devices to their computer comes under

QuestionsCategory: Endpoint SecurityPreventing users from accessing known dangerous locations on the internet, plugging in uncontrolled devices to their computer comes under
admin Staff asked 3 years ago

Preventing users from accessing known dangerous locations on the internet, plugging in uncontrolled devices to their computer comes under __________.

  • Attack surface reduction
  • preventing the exploitation of known and unknown vulnerabilities
  • Detection and prevention of deployment of malicious exploitable
  • Attack Remediation

 

Answer: Attack surface reduction