Which of the following is NOT normally used in system hardening:

a. Changing TCP/IP parameters
b. Removing unnecessary services
c. Removing unnecessary NICs
d. Renaming administrator userids

c. Removing unnecessary NICs

Computer Science & Information Technology

You might also like to view...

A decorative rule or pattern around a table is referred to as a(n) ________

Fill in the blank(s) with correct word

Computer Science & Information Technology

What are the Guidelines for creating master files or database ?

What will be an ideal response?

Computer Science & Information Technology