When performing system hardening, what are the two primary phases or operations to be performed?
A. Use a cable lock for portable devices, and define complex authentication factors.
B. Update to current version, and encrypt all communications.
C. Remove what is unnecessary, and lock down whatever remains.
D. Lock down access control, and implement monitoring.
Answer: C. Remove what is unnecessary, and lock down whatever remains.
You might also like to view...
Answer the following questions true (T) or false (F)
1. Functions are permitted to have only one input argument. 2. After the last statement of a function executes, control is transferred to the next defined function. 3. A function interface comment consists of the function result type or void, the function name, and the formal parameter declaration list.
__________ is not generally considered part of the kernel, but it must be resident.
a. MSDOS.SYS b. IO.SYS c. The command processor or shell d. None of the above
You would use ________ software to keep track of and play music, TV shows, and videos on your computer
Fill in the blank(s) with correct word
What are two probability distributions used in business and what is one practical application for each?
What will be an ideal response?