List two ways to prevent vulnerable software attacks.

What will be an ideal response?

Update software service packs regularly. Turn off all unused data ports on the computer.

Computer Science & Information Technology

You might also like to view...

What wildcard is used to represent multiple characters?

What will be an ideal response?

Computer Science & Information Technology

Which of the following is not an example of a processing control?

A. hash total. B. record count. C. batch total. D. check digit

Computer Science & Information Technology