I remember practicing a question about how Defender helps protect against phishing, which seems like a security issue, so I would lean towards option C.
This seems like a straightforward question. I think isolating the affected devices from the network would be the logical first step to contain the malware and prevent further spread.
This looks like a pretty straightforward question. I think the answer is A - using request.getCallerPrincipal() and ctx.getCallerPrincipal() to retrieve the Principal invoking the behavior.
upvoted 0 times
...
Log in to Pass4Success
Sign in:
Report Comment
Is the comment made by USERNAME spam or abusive?
Commenting
In order to participate in the comments you need to be logged-in.
You can sign-up or
login
Dalene
4 months agoPauline
4 months agoNovella
4 months agoVivan
5 months agoScarlet
5 months agoFelicia
5 months agoTonja
5 months agoJamal
5 months agoCheryll
5 months agoGwenn
5 months agoOlive
5 months ago