A security analyst on the threat-hunting team has developed a list of unneeded, benign services that are currently running as part of the standard OS deployment for workstations. The analyst will provide this list to the operations team to create a policy that will automatically disable the services for all workstations in the organization. Which of the following BEST describes the security analyst's goal?

A. To create a system baseline
B. To reduce the attack surface
C. To optimize system performance
D. To improve malware detection

Answer: B. To reduce the attack surface

Computer Science & Information Technology

You might also like to view...

If the macro

#define RECTANGLE_AREA(x, y) ((x) * (y)) has been defined. Then the line rectArea = RECTANGLE_AREA(a + 4, b + 7); will be expanded to a) rectArea = 11; b) rectArea = (a + 4 * b + 7); c) rectArea = ((a + 4) * (b + 7)); d) RECTANGLE_AREA(a + 4 , b + 7);

Computer Science & Information Technology

Orientation refers to the relative positions of the worksheet and the paper.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology