IT Certification Exams

On an endpoint, which method should you use to secure applications against exploits?

On an endpoint, which method should you use to secure applications against exploits?

A. endpoint-based firewall

B. strong user passwords

C. full-disk encryption

D. software patches