____ hardening involves disabling non-essential protocols and services, installing up-to-date service packs, patches, and hotfixes, and properly establishing access control permissions.

A. Network
B. System
C. Application
D. Operating system


Answer: D

Computer Science & Information Technology

You might also like to view...

The method of writing software that is centered on the procedures or actions that take place is known as __________ programming.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

When a headline is ____________________, it is positioned horizontally between the left and right margins on the page.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Some of the new things that ____ has made possible include adding video and audio to a page without using additional programs to play the video or audio.

A. HTML5 B. HTTP C. CSS3 D. SMTP

Computer Science & Information Technology

HIS, emergency department, and perioperative are three IS sources of an ADT message

Indicate whether the statement is true or false

Computer Science & Information Technology