1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
____ [38]
2 years ago
10

By definition, what is the process of reducing security exposure and tightening security controls?

Computers and Technology
1 answer:
saw5 [17]2 years ago
7 0

Hardening is the technique of reducing security exposure and tightening security controls of software and network devices.

Security is a major concern, when connecting over a network. Through hardening, security of a network is protected from vulnerable activities. Hardening reduces exposures associated with security and provides tight controls for it.

Hardening is typically a collection of tools and techniques that are used to decrease vulnerability in computer software, applications, network devices and infrastructure. The main goal of hardening is to protect security by identifying and eliminating superfluous programs, applications, permissions and access, which in turn, reduces the chances that attackers and malware will gain access over the network ecosystem.

You can learn more about hardening at

brainly.com/question/27912668

#SPJ4

You might be interested in
You've been asked to design a soho network on a work place. the other offices in the building also have wireless networks. while
Kipish [7]

In the scenario in which you should to design a SOHO network on a work place. the other offices in the building also have wireless networks. while setting up a wireless network for the SOHO, your initial step should be to run a wireless site survey.

This survey will help you to know which access points (AP) are in the most optimal locations.

5 0
3 years ago
To be a successful computer systems engineer, you must be proficient in programming languages and operating systems. Similarly,
Maslowich

Collectively, skills like the ones listed above are Technical skills. These skills refer to the Knowledge and ability to perform specific tasks. However, Soft skills are also important, because they relate to the ability to interact and communicate effectively with people.

6 0
3 years ago
Read 2 more answers
i need help or good site for my project topic: identification of problems hindering effective teaching and learning of computer
attashe74 [19]

Answer:

they learn how to be independent

and how to create their website at the young age and who make money and create jods

like me I'm learning IT at katlehong secondary school

and I'm now to create my website

4 0
3 years ago
What is the value stored in the variable myNum after the following assignment statement executes? myNum = 23 % 5
netineya [11]

Answer:

% is a modulus operator in most languages, returning the remainder when the preceding number is divided by the following one .  Assuming the language this question pertains to is one of those, then the answer is 3.

7 0
3 years ago
To create an SSL connection, a Web server requires a ________, which is an electronic document that confirms the identity of a w
pogonyaev

Answer:

c. SSL Certificate

Explanation:

The full form of SSL is Secure Sockets Layer. It is the standard security technology which establishes the encrypted link between a client and the server—typically a web server (which is the website) and the browser, or the mail server along with a mail client (for e.g., Outlook).

In the context, in order to develop an SSL connection, an SSL Certificate is required by the Web server.

3 0
3 years ago
Other questions:
  • His function starts a new session.
    12·1 answer
  • Write a program that generates a random number and asks the user to guess what the number is. If the user's guess is higher than
    6·1 answer
  • This solution will use an item quantity and a state code to calculate the total price of an item. The solution will calculate th
    10·1 answer
  • Your computer crashed, and you lost many personal and work-related files. You just got a new computer, but you are now much more
    8·2 answers
  • Write the definition of a function printLarger, which has two int parameters and returns nothing. The function prints the larger
    7·1 answer
  • In what way was the Ohio River Valley a factor in the French and Indian War? The Ohio River Valley was controlled by both France
    8·2 answers
  • Hey yall wanna send me some just ask for my phone #
    13·1 answer
  • Identify the type of software that should be in main memory in order to use the keyboard? *
    14·1 answer
  • when you arrived at the unit today and listened to the change of shift report, you heard about a patient named jane w. according
    6·1 answer
  • with a ____ the traffic of a given enterprise or group passes transparently through an internet in a way that effectively segreg
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!