Which of the following can be done to harden an operating system?
a. Uninstall unneeded applications and services.
b. Close unused ports.
c. Apply the latest security patches and fixes.
d. All the above.
ANS: D
You might also like to view...
Because it travels in UDP, an RTP message can be duplicated. Does a receiver need to keep a copy of all previously received messages to determine whether an incoming message is a duplicate? Why or why not?
What will be an ideal response?
New blank Word documents are created using the ________ template
A) Normal B) Start-up C) Home D) Blank Document
The company that you work for has implemented the following security controls: • All workstations have the latest patches and antivirus, • All sensitive data is encrypted in transit. • Dual-factor user authentication is used. • A firewall at the edge of the network is implemented. What is missing from this security posture?
A. no local encryption B. weak user authentication C. insufficient edge control D. exposure to viruses
The Census Bureau of the U.S. Department of Commerce estimated ecommerce retail sales in the United States for the first quarter of 2017 to be $105.7 billion, an increase of 14% from the first quarter of 2016.
Answer the following statement true (T) or false (F)