What is a critical step you should take on the OS you choose for a bastion host?

A. ensure all security patches are installed
B. make sure it is the latest OS version
C. choose an obscure OS with which attackers are unfamiliar
D. customize the OS for bastion operation


Answer: A

Computer Science & Information Technology

You might also like to view...

Consider the following code. The Catch block of code will not be executed if the user enters which of the following when prompted?

``` Private Sub btnCalc_Click(...) Handles btnCalc.Click Dim newNum, finalNum As Integer Dim message, message1 As String Try newNum = CInt(InputBox("ow old are you?") Catch message = "hat answer is not an Integer value." MessageBox.Show(message) newNum = 0 Finally finalNum = newNum + 1 message1 = "Your age next year will be " & finalNum & "." MessageBox.Show(message1) End Try End Sub ``` (A) one (B) 0 (C) 3000000000 (D) *

Computer Science & Information Technology

Overload function template printArray of Fig. 14.1 so that it takes two additional integer arguments, namely int lowSubscript and int highSubscript. A call to this function will print only the designated portion of the array. Validate lowSubscript and highSubscript; if either is out of range or if highSubscript is less than or equal to lowSubscript, the overloaded printArray function should

return 0; otherwise, printArray should return the number of elements printed. Then modify main to exercise both versions of printArray on arrays a, b and c (lines 23–25 of Fig. 14.1). Be sure to test all capabilities of both versions of printArray. What will be an ideal response?

Computer Science & Information Technology

What is a disadvantage of a stacked column chart?

A) This is only useful for one data series. B) There is a limit as to how many segments can be displayed. C) Segments do not start at the same point. D) Segments do not end at the same point.

Computer Science & Information Technology

What is the name given to Metro Ethernet configuration option that allows a committed information rate to be defined over a point-to-point E-Line between two devices?

A) LVC B) SLA C) BP D) BWP

Computer Science & Information Technology