A technician would like to restrict when internal hardware components on the server are accessed. Which of the following server hardening techniques should the technician implement?

A. Intrusion detection
B. BIOS password
C. Chassis lock
D. Disable WOL


Answer: C. Chassis lock

Computer Science & Information Technology

You might also like to view...

Which Linux command enables you to display memory usage and monitor virtual memory usage?

A. swapstat B. pagestat C. ram D. free

Computer Science & Information Technology

An Access view that displays the underlying view of an object

a. Design b. Field c. Outline

Computer Science & Information Technology

A list of virus definitions is generally in a file with a ________ extension

a. .dat b. .txt c. .vir d. def

Computer Science & Information Technology

Finds any value ending with "a"

What will be an ideal response?

Computer Science & Information Technology