A security technician is attempting to improve the overall security posture of an internal mail server. Which of the following actions would BEST accomplish this goal?

A. Monitoring event logs daily
B. Disabling unnecessary services
C. Deploying a content filter on the network
D. Deploy an IDS on the network


Answer: B. Disabling unnecessary services

Computer Science & Information Technology

You might also like to view...

In a function template, the programmer substitutes __________ for __________.

a. parameters, data types b. parameters, arguments c. arguments, parameters d. data types, parentheses e. None of these

Computer Science & Information Technology

Text effects include glows, 3-D rotations, and shadows

Indicate whether the statement is true or false

Computer Science & Information Technology

To ________ a window, means to return it to the size it was before it was maximized

Fill in the blank(s) with correct word

Computer Science & Information Technology

Match the following Common Criteria designators on the left with the correct descriptors on the right

1. EAL1 a. Formally verified design and tested 2. EAL2 b. Semi-formally designed and testing 3. EAL3 c. Methodically tested and checked 4. EAL5 d. Structurally tested 5. EAL7 e. Functionally tested

Computer Science & Information Technology