When performing system hardening, what are the two primary phases or operations to be performed?
A. Use a cable lock for portable devices, and define complex authentication factors.
B. Update to current version, and encrypt all communications.
C. Remove what is unnecessary, and lock down whatever remains.
D. Lock down access control, and implement monitoring.
Answer: C. Remove what is unnecessary, and lock down whatever remains.
You might also like to view...
Match the following features or parts of Office 2013 to their descriptions:
I. contextual tab II. Mini toolbar III. title bar IV. gallery V. status bar A. easy access to formatting commands B. contains groups of commands related to a specific, selected object C. set of selections when you click a More button D. contains information relative to the open file E. includes file name and application
A(n) ________ is a portion of a worksheet bounded by and separated from other portions by vertical and horizontal bars
Fill in the blank(s) with correct word