1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
____ [38]
2 years ago
10

By definition, what is the process of reducing security exposure and tightening security controls?

Computers and Technology
1 answer:
saw5 [17]2 years ago
7 0

Hardening is the technique of reducing security exposure and tightening security controls of software and network devices.

Security is a major concern, when connecting over a network. Through hardening, security of a network is protected from vulnerable activities. Hardening reduces exposures associated with security and provides tight controls for it.

Hardening is typically a collection of tools and techniques that are used to decrease vulnerability in computer software, applications, network devices and infrastructure. The main goal of hardening is to protect security by identifying and eliminating superfluous programs, applications, permissions and access, which in turn, reduces the chances that attackers and malware will gain access over the network ecosystem.

You can learn more about hardening at

brainly.com/question/27912668

#SPJ4

You might be interested in
An air-conditioning system's automatic controller might directly control the
yaroslaw [1]
Control the temperature of the system and as well as how long the system will run
5 0
3 years ago
Read 2 more answers
What is the name of the technology that is typically implemented on switches to avoid Ethernet connectivity problems when the wr
Andrew [12]

Answer:  Medium Dependent Interface Crossover (MDIX)

Explanation:

The technology that is typically implemented on switches to avoid Ethernet connectivity problems is Medium Dependent Interface Crossover(MDIX) For switches with Auto (MDIX) the connection is configured automatically and a crossover or straight-through cable can be used to connect two switches. When this MDIX interface is connected it corrects the connectivity speed and the cabling for proper device functionality.

4 0
3 years ago
DO MOBILE DEVICES HAVE TO WORK IN LIMITED SCREEN SPACE
Taya2010 [7]
Yes, mobile devices have to work in limited screen space.
8 0
3 years ago
Read 2 more answers
The science of networking is attributed to which government's involvement?
worty [1.4K]

Answer:

The United States

if I am not mistaken

6 0
3 years ago
Given the macro definition and global declarations shown in the image below, provide answers to the following questions:
galben [10]

Answer:

A. 243

B. True

C. 0

Explanation:

Macro instruction is a line of coding used in computer programming. The line coding results in one or more coding in computer program and sets variable for using other statements. Macros allows to reuse code. Macro has two parts beginning and end. After the execution of statement of quiz4 x, 4 the macro x will contain 243. When the macro is invoked the statement will result in an error. When the macro codes are executed the edx will contain 0. Edx serve as a macro assembler.

4 0
3 years ago
Other questions:
  • Which of the following is a useful policy to minimize waste and mistakes?
    6·1 answer
  • What term is used to describe a function that uses an algorithm to convert an input of letters and numbers into an encrypted out
    9·1 answer
  • Please Help!! Digital Information Technology Class!!
    12·2 answers
  • Microsoft’s SharePoint server product dramatically altered the content and records management (RM) markets. Crocker (2015), edit
    6·1 answer
  • Thomas has signed a deal with a production house that allows them to use his images on their website. What is required when imag
    5·2 answers
  • What is the output for the following code?<br><br> print (5*4+5)
    11·1 answer
  • How would you assign roles to your group members?
    9·2 answers
  • Microprocessor is what​
    14·1 answer
  • What is speaker?.....​
    13·1 answer
  • Create a function that takes an integer array as input and a value and returns a POINTER to the number of times the value appear
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!