Which one of the following activities transforms a zero-day vulnerability into a less dangerous attack vector?

A. Discovery of the vulnerability
B. Implementation of transport-layer encryption
C. Reconfiguration of a firewall
D. Release of a security patch


Answer: D. Release of a security patch

Computer Science & Information Technology

You might also like to view...

When applying a texture to a slide background, choose a texture that complements the content

Indicate whether the statement is true or false

Computer Science & Information Technology

As you create paths, if you select the ____________________ button on the options bar, Photoshop creates a shape layer on the Layers panel.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

A NIC's __________________ is a common point of failure.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Which development tool has rows of interconnected holes called tie points?

a. Microcontroller unit b. Solderless breadboard c. Single-board computer d. Passive components

Computer Science & Information Technology