Which of the following are elements of host hardening?

a. minimizing applications on the host
b. having a good border firewall
c. Both minimizing applications on the host and having a good border firewall
d. Neither minimizing applications on the host nor having a good border firewall


a. minimizing applications on the host

Computer Science & Information Technology

You might also like to view...

Write the code to declare a struct type person with two fields, name and age, and a pointer called aPointer to a struct type variable.

What will be an ideal response?

Computer Science & Information Technology

The _________________________ architecture results in the creation of pools of IT resources designed to accommodate concurrent and fluctuating usage.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Describe the difference between quoting strings using single quotation marks and using double quotation marks.

What will be an ideal response?

Computer Science & Information Technology

________ enables you to connect to the Internet using cellular 3G and 4G network standards

A) Satellite Internet access B) FTTH C) Municipal Wi-Fi D) Mobile Internet access

Computer Science & Information Technology