Which of the following should be done to harden a system?
a. Turn off unused services.
b. Apply port filtering and close unused ports.
c. Apply the latest security patches and fixes.
d. All the above.
ANS: D
Computer Science & Information Technology
You might also like to view...
The -> operator has a(n) ____________________ priority compared to the increment operator.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology
Which of the following protocols does NOT advertise the mask along with each advertised route?
A) EIGRP B) OSFP C) RIPv1 D) RIPv2
Computer Science & Information Technology
?Identify a property that is used to separate one column from the next using graphic dividing line.
A. ?column-rule B. ?column-count C. ?column-width D. ?column-gap
Computer Science & Information Technology
In the figure above, which number refers to the shadows slider?
A. 1 B. 2 C. 3 D. 4
Computer Science & Information Technology