Which of the following is a good place to begin your search for vulnerabilities in Microsoft products?

a. Hacking Web sites
b. Microsoft Security Bulletins
c. Newsgroup references to vulnerabilities
d. User manuals

Answer: b. Microsoft Security Bulletins

Computer Science & Information Technology

You might also like to view...

List and describe three types of problems that can result from uncontrolled access to the database.

What will be an ideal response?

Computer Science & Information Technology

The page rule code starts with the ____ character.

A. & B. $ C. # D. @

Computer Science & Information Technology