Which of the following should be done to harden a system?

a. Turn off unused services.
b. Apply port filtering and close unused ports.
c. Apply the latest security patches and fixes.
d. All the above.


ANS: D

Computer Science & Information Technology

You might also like to view...

The -> operator has a(n) ____________________ priority compared to the increment operator.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Which of the following protocols does NOT advertise the mask along with each advertised route?

A) EIGRP B) OSFP C) RIPv1 D) RIPv2

Computer Science & Information Technology

?Identify a property that is used to separate one column from the next using graphic dividing line.

A. ?column-rule B. ?column-count C. ?column-width D. ?column-gap

Computer Science & Information Technology

In the figure above, which number refers to the shadows slider?

A. 1 B. 2 C. 3 D. 4

Computer Science & Information Technology