Disabling unnecessary services, restricting administrative access, and enabling auditing controls on a server are forms of which of the following?
A. Application patch management
B. Cross-site scripting prevention
C. Creating a security baseline
D. System hardening
Answer: D. System hardening
You might also like to view...
If you have a class B IPv4 network and want to divide it into subnets, each with 126 hosts, which subnet mask should you use? How many networks 4 will be available? What are the four addresses (broadcast and network num- ber) for the network starting at 131.204.18?
What will be an ideal response?
Describe a remote access and wireless connection policy and the use of role-based authentication. Include two-factor authentication in your discussion.
What will be an ideal response?
What is the final stage of a virtual machine being made ready for a user connection?
A. orchestration B. brokering C. placement D. recording
Using Linux to backup your hard drive, if you want to create a hash, you would use the command-line command ___________
a. cc b. dd c. nd d. md5sum