A technician would like to restrict when internal hardware components on the server are accessed. Which of the following server hardening techniques should the technician implement?
A. Intrusion detection
B. BIOS password
C. Chassis lock
D. Disable WOL
Answer: C. Chassis lock
Computer Science & Information Technology
You might also like to view...
Which Linux command enables you to display memory usage and monitor virtual memory usage?
A. swapstat B. pagestat C. ram D. free
Computer Science & Information Technology
An Access view that displays the underlying view of an object
a. Design b. Field c. Outline
Computer Science & Information Technology
A list of virus definitions is generally in a file with a ________ extension
a. .dat b. .txt c. .vir d. def
Computer Science & Information Technology
Finds any value ending with "a"
What will be an ideal response?
Computer Science & Information Technology