Which of the following is NOT a recommended practice?

A. Disable all unnecessary services
B. enable all protocols
C. disable unused accounts
D. keep firmware up to date


B
Explanation: Any unused protocols should be disabled.

Computer Science & Information Technology

You might also like to view...

If the sort pattern split routine consistently splits the array into two pieces of equal size the runtime is

(N2) b) O(log N) c) O(N1/2) d) O(N log N) e) The run-time depends on too many things to answer this.

Computer Science & Information Technology

The most important TCP/IP Network Access layer protocol is ____________________.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

In some programming languages, strings are entered surrounded by either single or double quotation marks. Write a program that reads the three strings suzy, "suzy" and 'suzy'. Are the sin- gle and double quotes ignored or read as part of the string?

What will be an ideal response?

Computer Science & Information Technology

What are the critical components of a TCP header?

What will be an ideal response?

Computer Science & Information Technology