Which of the following would help mitigate threats inherent in legacy operating systems?
A.
Using a telecommunications carrier
B.
Using a device hardware provider
C.
Using an OS vendor
D.
Using an MDM
Explanation:
Which of the following would help mitigate threats inherent in legacy operating systems?
Which of the following would help mitigate threats inherent in legacy operating systems?
A.
Using a telecommunications carrier
B.
Using a device hardware provider
C.
Using an OS vendor
D.
Using an MDM
Explanation: