Multiple Choice
The process of turning off unnecessary features in the system is known as
A) Deep packet inspection
B) Hardening
C) Intrusion detection
D) War dialing
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q9: Which of the following describes one weakness
Q17: In 2007,a major U.S.financial institution hired a
Q23: Information technology managers are often in a
Q30: Encryption has a remarkably long and varied
Q38: This protocol specifies the procedures for dividing
Q40: Asymmetric key encryption combined with the information
Q50: Explain social engineering.
Q51: What is a penetration test?<br>
Q54: A special purpose hardware device or software
Q55: The process of transforming normal text into