The process to make a system as secure as it can be without adding on specialized software or equipment is _______________

a. Securitizing
b. Hardening
c. Routing
d. None of the above


Answer B. You may see the terms server hardening or router hardening.

Computer Science & Information Technology

You might also like to view...

Lockstep synchronization does not ________.

a) occur when threads must enter and leave their critical sections in strict alternation b) improve the efficiency of a process by forcing threads to operate at the same speed c) force faster threads to operate at the same speed as slower threads d) occur as a result of using a single variable to govern access to threads’ critical sections

Computer Science & Information Technology

Which of the following is NOT part of the Protect Presentation feature of PowerPoint?

A) Document Inspector B) Add a Digital Signature C) Encrypt with Password D) Mark as Final

Computer Science & Information Technology

An important advantage of using GUI data-entry objects is that you often can control what users enter by limiting their options.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

The _________________________ button on the Photoshop Tools panel is used to move or make other changes to selections.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology