To reduce the attack surface of a system, administrators should perform which of the following processes to remove unnecessary software, services, and insecure configuration settings?
A) Harvesting
B) Windowing
C) Hardening
D) Stealthing
Correct Answer:
Verified
Q125: Which of the following is an example
Q126: The Open Web Application Security Project (OWASP)
Q127: Which of the following is an advantage
Q128: An IT security engineer notices that the
Q129: In the OSI model, where does PPTP
Q131: Which of the following is a primary
Q132: Which of the following descriptions is true
Q133: If a tester is attempting to ping
Q134: The intrusion detection system at a software
Q135: Which of the following defines the role
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents