Anne, an administrator, notices unusual activity on a database server. After reviewing the logs, she notices a number of successful anonymous FTP logins and transferring of data to an external server. Which of the following hardening techniques would have helped stop this attack from succeeding? (Select TWO).
A.
Changing default account settings
B.
Up-to-date patching for operating system software
C.
Current updates for the NIDS
D.
Disabling unused ports and services
E.
Up-to-date patching for application system software
F.
Current updates for antivirus software
A,D