Which of the following describes the process of removing unnecessary accounts and services from an application to reduce risk exposure?

A. Error and exception handling
B. Application hardening
C. Application patch management
D. Cross-site script prevention


Answer: B. Application hardening

Computer Science & Information Technology

You might also like to view...

Given the function prototype and variable declarations, which of the following is a valid function call?

int something (int&, float&); // function prototype int p, q; //variable declarations float m; a) cout << something (3, 7.5); b) p = something (p, m); c) cout << something (p + q, m); d) q = something (q, 2.0);

Computer Science & Information Technology

Dynamic Web Parts cannot be edited by a user

Indicate whether the statement is true or false

Computer Science & Information Technology

Charts can be added to forms or queries. _________________________

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Answer the following statements true (T) or false (F)

1. Symmetric encryption is used primarily to provide confidentiality. 2. Two of the most important applications of public-key encryption are digital signatures and key management. 3. Cryptanalytic attacks try every possible key on a piece of ciphertext until an intelligible translation into plaintext is obtained. 4. The secret key is input to the encryption algorithm. 5. Triple DES takes a plaintext block of 64 bits and a key of 56 bits to produce a ciphertext block of 64 bits.

Computer Science & Information Technology