sitstareplay9595 sitstareplay9595 19-12-2022 Computers and Technology contestada you need to limit a compromised application from causing harm to other assets in your network. which strategy should you employ?