Identifying a list of all approved software on a system is a step in which of the following practices?

A. Passively testing security controls
B. Application hardening
C. Host software baselining
D. Client-side targeting


Answer: C. Host software baselining

Computer Science & Information Technology

You might also like to view...

Design a deferred-update pessimistic concurrency control.

What will be an ideal response?

Computer Science & Information Technology

Run-time type information can be used to determine:

a. A function’s return type. b. A function’s argument type. c. An object’s type. d. The number of arguments a function takes.

Computer Science & Information Technology

____ colors are designed as colors for secondary features on a slide.

A. Background B. Text C. Accent D. Hyperlink

Computer Science & Information Technology

What term is used for a string that appears in the actual code of a program?

a. string literal b. virtual string c. str d. any of these

Computer Science & Information Technology