Which of the following preventative controls would be appropriate for responding to a directive to reduce the attack surface of a specific host?

A. Installing anti-malware
B. Implementing an IDS
C. Taking a baseline configuration
D. Disabling unnecessary services

Answer: D. Disabling unnecessary services

Computer Science & Information Technology

You might also like to view...

Which of the following will allow the live state of the virtual machine to be easily reverted after a failed upgrade?

A. Replication B. Backups C. Fault tolerance D. Snapshots

Computer Science & Information Technology

When you create your own exceptions by inheriting from a built-in Exception class, you gain access to methods contained in the ____________________ class, such as those that display a default message describing an exception and that display the stack trace.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology