Which of the following controls would allow a company to reduce the exposure of sensitive systems from unmanaged devices on internal networks?
Which of the following preventative controls would be appropriate for responding to a directive to reduce the attack surface of a specific host?