I remember practicing a question about how Defender helps protect against phishing, which seems like a security issue, so I would lean towards option C.
This seems like a straightforward question. I think isolating the affected devices from the network would be the logical first step to contain the malware and prevent further spread.
This looks like a pretty straightforward question. I think the answer is A - using request.getCallerPrincipal() and ctx.getCallerPrincipal() to retrieve the Principal invoking the behavior.
upvoted 0
times
...
Log in to Pass4Success
Sign in:
Report Comment
Is the comment made by USERNAME spam or abusive?
Commenting
In order to participate in the comments you need to be logged-in.
You can sign-up or
login
Dalene
6 months agoPauline
6 months agoNovella
6 months agoVivan
6 months agoScarlet
6 months agoFelicia
6 months agoTonja
6 months agoJamal
6 months agoCheryll
7 months agoGwenn
7 months agoOlive
7 months ago