Which of the following is not one of the steps to secure IIS web server?
a. Disable unneeded services.
b. Lock down the system.
c. Use hidden fields.
d. Enable logging and auditing.
ANS: C
Computer Science & Information Technology
You might also like to view...
For a vector, inserting or deleting invalidates iterators in positions after the insertion or deletion. What happens to the set container if we delete in the middle?
What will be an ideal response?
Computer Science & Information Technology
Level 3 cache memory is faster than the other cache memory levels
Indicate whether the statement is true or false
Computer Science & Information Technology
Which of the following creates a header for a document that can be reused?
A) Theme B) Quick part C) Style D) Building blocks
Computer Science & Information Technology
What types of authentication do you use when you withdraw cash from an automated teller machine (ATM)?
a. Type 1 and Type 2 b. Type 1 and Type 3 c. Type 1 d. Type 2
Computer Science & Information Technology