List two ways to prevent vulnerable software attacks.
What will be an ideal response?
Update software service packs regularly. Turn off all unused data ports on the computer.
Computer Science & Information Technology
You might also like to view...
What wildcard is used to represent multiple characters?
What will be an ideal response?
Computer Science & Information Technology
Which of the following is not an example of a processing control?
A. hash total. B. record count. C. batch total. D. check digit
Computer Science & Information Technology