View all questions & answers for the P3 exam
A company is keen to avoid becoming a victim to malware. Which TWO of the following techniques would be valid responses to this threat?
Removing USB ports from all networked computers
Reverse engineering all viruses that are discovered on company machines
Conducting denial of service attacks against perpetrators who attempt to infect the company
Paying ransomware demands immediately in order to ensure that malware is removed promptly
Providing computers with independent internet access in the staff break room for personal emails and online shopping
Submit