A user learns of an operating system vulnerability that would allow a hacker to access the
computer. The user would like to keep the operating system up to date to prevent such
vulnerabilities from occurring. Which of the following should the user configure?
A.
Automatic updates
B.
Software firewall
C.
Additional OS features
D.
Anti-malware software