Identifying a list of all approved software on a system is a step in which of the following practices?
A. Passively testing security controls
B. Application hardening
C. Host software baselining
D. Client-side targeting
Answer: C. Host software baselining
Computer Science & Information Technology
You might also like to view...
Design a deferred-update pessimistic concurrency control.
What will be an ideal response?
Computer Science & Information Technology
Run-time type information can be used to determine:
a. A function’s return type. b. A function’s argument type. c. An object’s type. d. The number of arguments a function takes.
Computer Science & Information Technology
____ colors are designed as colors for secondary features on a slide.
A. Background B. Text C. Accent D. Hyperlink
Computer Science & Information Technology
What term is used for a string that appears in the actual code of a program?
a. string literal b. virtual string c. str d. any of these
Computer Science & Information Technology