The following steps should be used to secure an operating system:
a. test the security of the basic operating system
b. remove unnecessary services
c. install and patch the operating system
d. all of the above
d. all of the above
Computer Science & Information Technology
You might also like to view...
The ____ nonprofit organization was created to design, manufacture, and distribute affordable laptop computers to every child in the world in order to provide them with access to new channels of learning, sharing, and self-expression.
A. OX B. Simputer C. OLPC D. InternetWorld
Computer Science & Information Technology
Once a company's resources are enumerated, the next step is to ________.
A. enumerate threats to each B. classify them according to sensitivity C. assess the degree to which each is already protected D. create a protection plan for each
Computer Science & Information Technology