Briefly describe the concept of hardening your network.

What will be an ideal response?


Once you've recognized threats and vulnerabilities, it's time to start applying security hardware, software, and processes to your network to prevent bad things from happening. This is called hardening your network.
 

Computer Science & Information Technology

You might also like to view...

Case-Based Critical Thinking QuestionsCase 10-1Training unlimited is planning to create a page that will allow users to e-mail their requests for the training videos to add to their online training offerings. To make their code reusable, the Web designer should put it into a ____.

A. head B. function C. body D. all the above

Computer Science & Information Technology

What is Probing ?

What will be an ideal response?

Computer Science & Information Technology

In Access, a report allows you to enter records without having to open a table

Indicate whether the statement is true or false

Computer Science & Information Technology

A repeating group is a set of one or more fields that can occur only once in a single record, with each occurrence having the same value.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology