How do you harden the operating system in terms of security?
What will be an ideal response?
To harden the operating system, research the platform on which the database resides and identify any ports that are left open as a default setting. Close those ports that are unnecessary or not being used (e.g., FTP, Telnet).
You might also like to view...
Which of the following indicates that it is derived from Chef?
``` class Chef { protected: string restaurant; int helpers; public: Chef(string m, int h); }; ``` A. class PastryChef :: public Chef B. PastryChef Chef; C. Chef PastryChef D. class PastryChef : protected Chef;
?Generally, reports used by individuals at higher levels in an organization include more detail than reports used by lower-level employees.
Answer the following statement true (T) or false (F)
In a __________ implementation, the entire security system is put in place in a single office, department, or division before expanding to the rest of the organization.
A. loop B. direct C. parallel D. pilot
What is the name of the protocol that defines a set of common functions that actual authentication methods can use to authenticate users?
A) Expanded Authentication Protocol B) Wireless Security Protocol C) Extensible Authentication Protocol D) Multi-security Protocol