A security administrator has been assigned to review the security posture of the standard corporate system image for virtual machines. The security administrator conducts a thorough review of the system logs, installation procedures, and network configuration of the VM image. Upon reviewing the access logs and user accounts, the security administrator determines that several accounts will not be used in production.Which of the following would correct the deficiencies?
A. Mandatory access controls
B. Disable remote login
C. Host hardening
D. Disabling services
Answer: C. Host hardening
You might also like to view...
The ________ in Excel allows for a side-by-side comparison of your analysis
A) Goal Seek B) Solver C) Data Table D) Scenario Manager
Only the first example in this chapter uses the movie object. Rewrite any of the other example programs to create a movie object and return the movie object.
Note: For most examples this only involves adding the final two lines from program 170 onto the end of the example.
Which attribute defines the number of times a background image displays?
A) loop B) repeat C) continue D) redisplay
If you decide that you do not want to save the changes you have made during your current work session, you can reverse the changes by executing the ____________________ command.
Fill in the blank(s) with the appropriate word(s).