To reduce the attack surface of a system, administrators should perform which of the following
processes to remove unnecessary software, services, and insecure configuration settings?
A.
Harvesting
B.
Windowing
C.
Hardening
D.
Stealthing
To reduce the attack surface of a system, administrators should perform which of the following
processes to remove unnecessary software, services, and insecure configuration settings?
To reduce the attack surface of a system, administrators should perform which of the following
processes to remove unnecessary software, services, and insecure configuration settings?
A.
Harvesting
B.
Windowing
C.
Hardening
D.
Stealthing
C