Which of the following preventative controls would be appropriate for responding to a directive to reduce the attack surface of a specific host?
A. Installing anti-malware
B. Implementing an IDS
C. Taking a baseline configuration
D. Disabling unnecessary services
Answer: D. Disabling unnecessary services
Computer Science & Information Technology
You might also like to view...
Which of the following will allow the live state of the virtual machine to be easily reverted after a failed upgrade?
A. Replication B. Backups C. Fault tolerance D. Snapshots
Computer Science & Information Technology
When you create your own exceptions by inheriting from a built-in Exception class, you gain access to methods contained in the ____________________ class, such as those that display a default message describing an exception and that display the stack trace.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology