Answer:
D
Explanation:
All three of A, B and C are required to harden a host. Thus, All of the above makes the best option.
Hardening simply refers to making your data impossible to be penetrated. More like bulletproof.
To do this, ensure measures like
- Regular Program cleanup
- Patches management
- service pack installation
- service or usage policies
...among others.
Cheers
The correct answer is letter B. Application Software. Word Processing software, spreadsheet software, database software, and presentation software are examples of Application software. These are applications that are mostly output based.
Answer:
The features of any windows are
1. Start menu
2. Notification area or task bar
3. Window snipping tools
4. Using Local Area Networks
5. Windows explorer libraries
Explanation:
Answer:
Explanation:
A cloud model allows organizations to purchase only the storage they need – when they need it – eliminating traditional infrastructure expenses. With this model, an organization can use these cost savings for AI development
Answer:
<u>/var</u>
Explanation:
The /var subdirectory contains files to which the system writes data during the course of its operation. Hence, since it serves as a system directory, it would prevent log files from consuming a large amount of data.