When performing system hardening, what are the two primary phases or operations to be performed?

A. Use a cable lock for portable devices, and define complex authentication factors.
B. Update to current version, and encrypt all communications.
C. Remove what is unnecessary, and lock down whatever remains.
D. Lock down access control, and implement monitoring.


Answer: C. Remove what is unnecessary, and lock down whatever remains.

Computer Science & Information Technology

You might also like to view...

Answer the following questions true (T) or false (F)

1. Functions are permitted to have only one input argument. 2. After the last statement of a function executes, control is transferred to the next defined function. 3. A function interface comment consists of the function result type or void, the function name, and the formal parameter declaration list.

Computer Science & Information Technology

__________ is not generally considered part of the kernel, but it must be resident.

a. MSDOS.SYS b. IO.SYS c. The command processor or shell d. None of the above

Computer Science & Information Technology

You would use ________ software to keep track of and play music, TV shows, and videos on your computer

Fill in the blank(s) with correct word

Computer Science & Information Technology

What are two probability distributions used in business and what is one practical application for each?

What will be an ideal response?

Computer Science & Information Technology