Which of the following should be done to harden a system?
A) Turn off unused services.
B) Turn on the Windows port filters.
C) Apply the latest security patches and fixes.
D) All of the above
D) All of the above
You might also like to view...
The height of characters, measured in points is called ________
Fill in the blank(s) with correct word
Which of the following is considered an example of probable cause?
a. Law enforcement's personal observation b. Criminal profiling c. Reliable hearsay d. All of the above.
When creating a PivotTable report, the active cell should be positioned ____.
A. anywhere in the range that contains the data B. in cell A1 C. anywhere outside the range that contains the data D. There is no active cell in a PivotTable report.
While performing surveillance activities, an attacker determines that an organization is using 802.1X to secure LAN access.Which of the following attack mechanisms can the attacker utilize to bypass the identified network security?
A. MAC spoofing B. Pharming C. Xmas attack D. ARP poisoning