Which is the BEST configuration option to protect internal users from malicious Java code, without stripping Java scripts?

Which is the BEST configuration option to protect internal users from malicious Java code, without
stripping Java scripts?

Which is the BEST configuration option to protect internal users from malicious Java code, without
stripping Java scripts?

A.
Use the URI resource to strip ActiveX tags

B.
Use the URI resource to block Java code

C.
Use CVP in the URI resource to block Java code

D.
Use the URI resource to strip applet tags

Explanation:



Leave a Reply 0

Your email address will not be published. Required fields are marked *