Which of the following is NOT normally used in system hardening:
a. Changing TCP/IP parameters
b. Removing unnecessary services
c. Removing unnecessary NICs
d. Renaming administrator userids
c. Removing unnecessary NICs
Computer Science & Information Technology
You might also like to view...
A decorative rule or pattern around a table is referred to as a(n) ________
Fill in the blank(s) with correct word
Computer Science & Information Technology
What are the Guidelines for creating master files or database ?
What will be an ideal response?
Computer Science & Information Technology