Which of the following is not one of the steps to secure IIS web server?

a. Disable unneeded services.
b. Lock down the system.
c. Use hidden fields.
d. Enable logging and auditing.


ANS: C

Computer Science & Information Technology

You might also like to view...

For a vector, inserting or deleting invalidates iterators in positions after the insertion or deletion. What happens to the set container if we delete in the middle?

What will be an ideal response?

Computer Science & Information Technology

Level 3 cache memory is faster than the other cache memory levels

Indicate whether the statement is true or false

Computer Science & Information Technology

Which of the following creates a header for a document that can be reused?

A) Theme B) Quick part C) Style D) Building blocks

Computer Science & Information Technology

What types of authentication do you use when you withdraw cash from an automated teller machine (ATM)?

a. Type 1 and Type 2 b. Type 1 and Type 3 c. Type 1 d. Type 2

Computer Science & Information Technology