1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
____ [38]
2 years ago
10

By definition, what is the process of reducing security exposure and tightening security controls?

Computers and Technology
1 answer:
saw5 [17]2 years ago
7 0

Hardening is the technique of reducing security exposure and tightening security controls of software and network devices.

Security is a major concern, when connecting over a network. Through hardening, security of a network is protected from vulnerable activities. Hardening reduces exposures associated with security and provides tight controls for it.

Hardening is typically a collection of tools and techniques that are used to decrease vulnerability in computer software, applications, network devices and infrastructure. The main goal of hardening is to protect security by identifying and eliminating superfluous programs, applications, permissions and access, which in turn, reduces the chances that attackers and malware will gain access over the network ecosystem.

You can learn more about hardening at

brainly.com/question/27912668

#SPJ4

You might be interested in
A small company with 100 computers has hired you to install a local area network. All fo the users perform functions like email,
Nadusha1986 [10]

Answer:

Based on the requirements indicated in the question above, the best Local Area Network (LAN) operating system that can be used is

Windows 7 , 8.1 or Windows 10. This is because they all are configured to handle extensive LAN activity and can connect over 200 users.

Explanation:  

Generally speaking, Windows 10 packs more improvement over the previous windows.

Cheers

6 0
2 years ago
Open this link after reading about Ana's situation. Complete each sentence using the drop-downs. Ana would need a minimum of ato
Arte-miy333 [17]

bachelor degree and grow

6 0
3 years ago
Read 2 more answers
When using a line graph, why is it inportant to only graph 1 - 3 series of data?. A. A line graph in Microsoft Excel will not al
ElenaW [278]
The most necessary point you need to follow when using a line graph, is to make your graph readable. So, the reason why is it inportant to only graph 1 - 3 series of data is that more than 3 series of data causes too many lines on the graph, which makes ti confusing to read. The last option is the correct one.
8 0
3 years ago
In an all-integer linear program,
xenn [34]

Answer: E

All decision variables must be integer

Explanation:

The integer-linear program is a program in which the objective function and any constraints are all linear ie all of the variables are restricted to be integers.

A linear program is Np complete. Also every decision variable appear in any constraints must also appear in the objective function, possibly with zero coefficient if needed.

8 0
3 years ago
Which of the following is NOT part of the Ethernet standards? O 1.802.3 O 2.802.2 O 3 LLC O4 pPp
mote1985 [20]

Answer: 2) 802.2

Explanation: Ethernet standard are the standard for the networking technology for the transmission of the data.The ethernet is requires for the node connection and then forming the framework for the transmission of information.There are several standards for Ethernet.

802.3 is Ethernet standard that works on 10 Mbps rate, PPP(point to point protocol) is the standard that connects the internet service provider using modem and LLC(logical link control) is a standard for 802 .There is no 802.2 standard present in the ethernet standard.Thus,the correct option is option(2).

7 0
3 years ago
Other questions:
  • Which one of these tasks best describes the process of localization?
    12·1 answer
  • The maximum number of colors that should be used on a slide is _____. 2 4 6 8
    5·1 answer
  • Assume you are a network consultant for a company that is designing a private WAN to communicate between five locations spread t
    10·1 answer
  • 13 POINTS! Which option is used to ensure the integrity and authenticity of a Word document but requires additional services to
    6·2 answers
  • What is emerging as a major business area of innovation that offers a flexible collection of computers on the internet that can
    6·1 answer
  • When searching for an image on your computer, you should look for a file with which of the following extensions?
    8·1 answer
  • Examination of Internet records in order to reveal the identity of an anonymous poster is defined as
    13·1 answer
  • Listed here are a few camera angles and their images.
    10·1 answer
  • Complete the sentence.
    5·1 answer
  • If the starting address location changes, in which of the following cases, the program has to be recompiled? Select one: a. Both
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!