1. A vendor is alerted of a newly discovered flaw in its software that presents a major vulnerability to systems. While working to prepare a fix action, the vendor releases a notice alerting the community of the discovered flaw and providing best practices to follow until the patch is available. Which of the following best describes the discovered flaw?
A. Input validation flaw
B. Shrink-wrap vulnerability
C. Insider vulnerability
2. A security professional applies encryption methods to communication channels. Which security control role is she attempting to meet?