Which of the following techniques describes the use of application isolation during execution to pre
seenagape
Which of the following techniques describes the use of application isolation during execution to prevent system compromise if the application is compromised?