Preventing users from accessing known dangerous locations on the internet, plugging in uncontrolled devices to their computer comes under __________.
- Attack surface reduction
- preventing the exploitation of known and unknown vulnerabilities
- Detection and prevention of deployment of malicious exploitable
- Attack Remediation
Answer: Attack surface reduction