1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
____ [38]
2 years ago
10

By definition, what is the process of reducing security exposure and tightening security controls?

Computers and Technology
1 answer:
saw5 [17]2 years ago
7 0

Hardening is the technique of reducing security exposure and tightening security controls of software and network devices.

Security is a major concern, when connecting over a network. Through hardening, security of a network is protected from vulnerable activities. Hardening reduces exposures associated with security and provides tight controls for it.

Hardening is typically a collection of tools and techniques that are used to decrease vulnerability in computer software, applications, network devices and infrastructure. The main goal of hardening is to protect security by identifying and eliminating superfluous programs, applications, permissions and access, which in turn, reduces the chances that attackers and malware will gain access over the network ecosystem.

You can learn more about hardening at

brainly.com/question/27912668

#SPJ4

You might be interested in
Types of computer that we use in our daily life​
ozzi

Answer:

all coumputers

Explanation:

i just like coumputers

5 0
3 years ago
Read 2 more answers
Yuri is a skilled computer security expert who attempts to break into the systems belonging to his clients. He has permission fr
Tatiana [17]

Answer:

b) White-hat hacker

Explanation:

This is also called an ethical hacker. Unlike the other options, a white-hat hacker is a person specialized on computational security which offers services to organizations to test how safe they are from informatic attacks (viruses, theft of information, etc). This is carried out  based on a agreement between the whihte-hat hacker and the client via a contract.  

8 0
3 years ago
I want to take several courses of MIT OCW, and I'm searching for study groups. Is this website the place to find them?
Ymorist [56]
No, this website is not for study groups. It's more of a 'question and answer' website. There is no actual communication on one certain subject. Although I do know a few websites that have worked really well for me,where you can create and participate in study groups;
-studyblue
- studyhall
- getstudyroom
all of these are safe websites that are used by wide variety of students, therefore i'm sure you can find plenty of people interested in learning the same things as you!
3 0
3 years ago
When one method calls another, which of the following statements are true? The class methods and instance methods of one class m
Ivenika [448]

Answer:

All the 3 statements are true.

Explanation:

1. The class methods and instance methods of one class may call the public class methods of another class using dot notation and referencing the name of the other class.

2. The class methods and instance methods of one class may call the private instance methods of another class by using dot notation to invoke the method on an instance of the other class.

3. The instance methods of a class may call, without using dot notation, any class method of the same class.

All the above mentioned statements are true.

6 0
3 years ago
Which concept allows the computer to repeat a group of steps in an
allochka39001 [22]

Answer:

A

Explanation:

I was gonna say 'loop' from my computing days. but it is now called iteration

7 0
2 years ago
Other questions:
  • For a typically large organization how many dns servers should you install
    5·1 answer
  • Any program that allows the user to select an item from a menu should ________ the user's selection.
    7·1 answer
  • bj;ljfg'cfmb dfl kbslf jflk[gkdblkfd lbrkjlfbbfkjbdfjkbadbjbbkvbk'lbk'blbf;l;lkb lm;flklmkjlvkljvkljvbfbdsjsfbbjjlkbfjklbkfj'lgg
    9·2 answers
  • Text messaging is an example of nonverbal communication. Please select the best answer from the choices provided. T F
    7·2 answers
  • 12. Kelly would like to know the average bonus multiplier for the employees. In cell C11, create a formula using the AVERAGE fun
    7·1 answer
  • When you make a DNS query, where does your computer first check to find an IP address to name mapping?
    8·1 answer
  • I love the brainly update guys! :)
    5·2 answers
  • A reflective cross-site scripting attack (like the one in this lab) is a __________ attack in which all input shows output on th
    14·1 answer
  • Some of y'all make me lose braincells with your questions
    10·2 answers
  • Identify the network and the host address in the ip address of 12.128.120.131 with a subnet mask of 255.128.0.0.
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!