Known exploits have a confirmation of and measures can be taken against it to resolve them.
(a) True
(b) False
I have been asked this question in examination.
This key question is from Exploits and Exploitation in section Cyber Security of Cyber Security