As part of a new industry regulation, companies are required to utilize secure, standardized OS settings. A technical must ensure the OS settings are hardened.Which of the following is the BEST way to do this?
A. Use a vulnerability scanner.
B. Use a configuration compliance scanner.
C. Use a passive, in-line scanner.
D. Use a protocol analyzer.
Answer: B. Use a configuration compliance scanner.
Computer Science & Information Technology
You might also like to view...
Which of the following prevents data from being corrupted by two concurrent operations?
A. data recovery B. data aggregation C. data isolation D. data zoning
Computer Science & Information Technology
Typography includes the use of font families, sizes, and colors as well as managing white space through the use of ____.
A. padding only B. margins only C. padding and margins D. None of the above.
Computer Science & Information Technology