An IT security technician needs to establish host based security for company workstations. Which
of the following will BEST meet this requirement?
A.
Implement IIS hardening by restricting service accounts.
B.
Implement database hardening by applying vendor guidelines.
C.
Implement perimeter firewall rules to restrict access.
D.
Implement OS hardening by applying GPOs.