Disabling unnecessary services, restricting administrative access, and enabling auditing controls on a server are forms of which of the following?

A. Application patch management
B. Cross-site scripting prevention
C. Creating a security baseline
D. System hardening


Answer: D. System hardening

Computer Science & Information Technology

You might also like to view...

If you have a class B IPv4 network and want to divide it into subnets, each with 126 hosts, which subnet mask should you use? How many networks 4 will be available? What are the four addresses (broadcast and network num- ber) for the network starting at 131.204.18?

What will be an ideal response?

Computer Science & Information Technology

Describe a remote access and wireless connection policy and the use of role-based authentication.  Include two-factor authentication in your discussion.

What will be an ideal response?

Computer Science & Information Technology

What is the final stage of a virtual machine being made ready for a user connection?

A. orchestration B. brokering C. placement D. recording

Computer Science & Information Technology

Using Linux to backup your hard drive, if you want to create a hash, you would use the command-line command ___________

a. cc b. dd c. nd d. md5sum

Computer Science & Information Technology