On an endpoint, which method should you use to secure applications against exploits?
A. endpoint-based firewall
B. strong user passwords
C. full-disk encryption
D. software patches
On an endpoint, which method should you use to secure applications against exploits?
A. endpoint-based firewall
B. strong user passwords
C. full-disk encryption
D. software patches