Attacking well-known system defaults is one of the most common hacker attacks. Most software is
shipped with a default configuration that makes it easy to install and setup the application. You
should change the default settings to secure the system.
Which of the following is NOT an example of default installation?
A.
Many systems come with default user accounts with well-known passwords that administrators
forget to change
B.
Often, the default location of installation files can be exploited which allows a hacker to retrieve
a file from the system
C.
Many software packages come with “samples” that can be exploited, such as the sample
programs on IIS web services
D.
Enabling firewall and anti-virus software on the local system