What would best mitigate the executable-code exploits that can perform a variety of malicious acts, such as erasing your hard drive?

What would best mitigate the executable-code exploits that can perform a variety of malicious
acts, such as erasing your hard drive?

What would best mitigate the executable-code exploits that can perform a variety of malicious
acts, such as erasing your hard drive?

A.
assigning blocking actions to signatures that are controlled by the State engine

B.
assigning the TCP reset action to signatures that are controlled by the Normalizer engine

C.
enabling blocking

D.
assigning deny actions to signatures that are controlled by the Trojan engines

E.
enabling Application Policy Enforcement



Leave a Reply 0

Your email address will not be published. Required fields are marked *