The process of making certain that an entity (operating system, application, etc.) is as secure as it can be is known as:
Which of the following describes the process of removing unnecessary accounts and services from an application to reduce risk exposure?
Which of the following can a security administrator implement on mobile devices that will help prevent unwanted people from viewing the data if the device is left unattended?