A recent audit has revealed weaknesses in the process of deploying new servers and network
devices. Which of the following practices could be used to increase the security posture during
deployment? (Select TWO).
A.
Deploy a honeypot
B.
Disable unnecessary services
C.
Change default passwords
D.
Implement an application firewall
E.
Penetration testing