To reduce the attack surface of a system, administrators should perform which of the following processes to
remove unnecessary software, services, and insecure configuration settings?
A.
Harvesting
B.
Windowing
C.
Hardening
D.
Stealthing
To reduce the attack surface of a system, administrators should perform which of the following processes to
remove unnecessary software, services, and insecure configuration settings?
To reduce the attack surface of a system, administrators should perform which of the following processes to
remove unnecessary software, services, and insecure configuration settings?
A.
Harvesting
B.
Windowing
C.
Hardening
D.
Stealthing