Which of the following is Jane, a security administrator, MOST likely implementing when deleting all the unneeded files and modules of a newly installed application?
A. Exception handling
B. Patch management
C. System file clean up
D. Application hardening
Answer: D. Application hardening
You might also like to view...
The ______________ statement selects among multiple actions based on the possible values of an integer variable or expression, or a String.
Fill in the blank(s) with the appropriate word(s).
The ____ method is probably the most popular method for finding the root of a function.
a. secant b. bisection c. interpolation d. interval
Serialization refers to the process of converting an object into binary data that you can store for reuse.
Answer the following statement true (T) or false (F)
A technician is notified of an inkjet printer not printing properly. The user's computer has the printer software loaded and is not displaying any errors. A test print was performed, with one of the colors not printing properly. Which of the following would the technician typically perform FIRST to resolve the issue?
A. Replace cartridges B. Run a cleaning page C. Clean heads D. Clean fuser assembly