G
GIAC Certified Enterprise Defender
88 Questions
Question No. 1
Which of the following would be used in order to restrict software form performing unauthorized operations, such as invalid access to memory or invalid calls to system access?
Choose the correct option from the given list.
01 / 88