Which one of the following activities transforms a zero-day vulnerability into a less dangerous attack vector?
A. Discovery of the vulnerability
B. Implementation of transport-layer encryption
C. Reconfiguration of a firewall
D. Release of a security patch
Answer: D. Release of a security patch
Computer Science & Information Technology
You might also like to view...
Which type of snip would you choose if you wanted to draw an irregular line around the area of a screen?
A) full-screen B) free-form C) rectangular D) window
Computer Science & Information Technology
The names and addresses in a data source file created with Word are displayed in:
A) columns only. B) a table. C) a tabbed list. D) a bulleted list.
Computer Science & Information Technology