Author Question: The final step in the process of initially securing the base operating system is ________. What ... (Read 80 times)

skymedlock

  • Hero Member
  • *****
  • Posts: 561
The final step in the process of initially securing the base operating system is ________.
 
  What will be an ideal response?

Question 2

The most important changes needed to improve system security are to ______.
 
  A. disable remotely accessible services that are not required
   B. ensure that applications and services that are needed are appropriately configured
   C. disable services and applications that are not required
   D. all of the above



abro1885

  • Sr. Member
  • ****
  • Posts: 337
Answer to Question 1

security testing

Answer to Question 2

D



Related Topics

Need homework help now?

Ask unlimited questions for free

Ask a Question
 

Did you know?

On average, someone in the United States has a stroke about every 40 seconds. This is about 795,000 people per year.

Did you know?

A seasonal flu vaccine is the best way to reduce the chances you will get seasonal influenza and spread it to others.

Did you know?

Patients should never assume they are being given the appropriate drugs. They should make sure they know which drugs are being prescribed, and always double-check that the drugs received match the prescription.

Did you know?

Vaccines cause herd immunity. If the majority of people in a community have been vaccinated against a disease, an unvaccinated person is less likely to get the disease since others are less likely to become sick from it and spread the disease.

Did you know?

When blood is exposed to air, it clots. Heparin allows the blood to come in direct contact with air without clotting.

For a complete list of videos, visit our video library