Which one of the following activities transforms a zero-day vulnerability into a less dangerous attack vector?
A. Discovery of the vulnerability
B. Implementation of transport-layer encryption
C. Reconfiguration of a firewall
D. Release of a security patch
Answer: D. Release of a security patch
You might also like to view...
When applying a texture to a slide background, choose a texture that complements the content
Indicate whether the statement is true or false
As you create paths, if you select the ____________________ button on the options bar, Photoshop creates a shape layer on the Layers panel.
Fill in the blank(s) with the appropriate word(s).
A NIC's __________________ is a common point of failure.
Fill in the blank(s) with the appropriate word(s).
Which development tool has rows of interconnected holes called tie points?
a. Microcontroller unit b. Solderless breadboard c. Single-board computer d. Passive components