Skip to main content This browser is no longer supported. Show
Upgrade to Microsoft Edge to take advantage of the latest features, security updates, and technical support. Windows message center
In this articleRecent announcements
What are the five steps that can be used to ensure the security of an OS?Five step process for protecting operating system.. Develop the security policy.. Perform host software baselining.. Configure operating system security and settings.. Deploy the settings.. Implement patch management.. Which statement are the example of application hardening techniques?Examples of application hardening include, but are not limited to:. Patching standard and third-party applications automatically.. Using firewalls.. Using antivirus, malware, and spyware protection applications.. Using software-based data encryption.. Using CPUs that support Intel Software Guard Extensions (SGX). What is the best option to use to isolate an operating system?What is the best option to use to isolate an operating system? . D. Virtualization software should be used to isolate operating systems from attacks and other types of threats.
Which of the following is the greatest risk of a virtual computer?The biggest risk of running a virtual computer is that it will go offline immediately if the server that it is housed on fails. All other virtual computers on that particular server will also go offline immediately.
|