which of the following processes to remove unnecessary software, services, and insecure configuration settings?

To reduce the attack surface of a system, administrators should perform which of the following
processes to remove unnecessary software, services, and insecure configuration settings?

To reduce the attack surface of a system, administrators should perform which of the following
processes to remove unnecessary software, services, and insecure configuration settings?

A.
Harvesting

B.
Windowing

C.
Hardening

D.
Stealthing



Leave a Reply 1

Your email address will not be published. Required fields are marked *


Ghost Man

Ghost Man

C is the Ans.