Which one of the following activities transforms a zero-day vulnerability into a less dangerous attack vector?

A. Discovery of the vulnerability
B. Implementation of transport-layer encryption
C. Reconfiguration of a firewall
D. Release of a security patch

Answer: D. Release of a security patch

Computer Science & Information Technology

You might also like to view...

Which type of snip would you choose if you wanted to draw an irregular line around the area of a screen?

A) full-screen B) free-form C) rectangular D) window

Computer Science & Information Technology

The names and addresses in a data source file created with Word are displayed in:

A) columns only. B) a table. C) a tabbed list. D) a bulleted list.

Computer Science & Information Technology