Author Question: The final step in the process of initially securing the base operating system is ________. What ... (Read 26 times)

skymedlock

  • Hero Member
  • *****
  • Posts: 561
The final step in the process of initially securing the base operating system is ________.
 
  What will be an ideal response?

Question 2

The most important changes needed to improve system security are to ______.
 
  A. disable remotely accessible services that are not required
   B. ensure that applications and services that are needed are appropriately configured
   C. disable services and applications that are not required
   D. all of the above



abro1885

  • Sr. Member
  • ****
  • Posts: 337
Answer to Question 1

security testing

Answer to Question 2

D



Related Topics

Need homework help now?

Ask unlimited questions for free

Ask a Question
 

Did you know?

Blastomycosis is often misdiagnosed, resulting in tragic outcomes. It is caused by a fungus living in moist soil, in wooded areas of the United States and Canada. If inhaled, the fungus can cause mild breathing problems that may worsen and cause serious illness and even death.

Did you know?

The eye muscles are the most active muscles in the whole body. The external muscles that move the eyes are the strongest muscles in the human body for the job they have to do. They are 100 times more powerful than they need to be.

Did you know?

Malaria mortality rates are falling. Increased malaria prevention and control measures have greatly improved these rates. Since 2000, malaria mortality rates have fallen globally by 60% among all age groups, and by 65% among children under age 5.

Did you know?

The lipid bilayer is made of phospholipids. They are arranged in a double layer because one of their ends is attracted to water while the other is repelled by water.

Did you know?

Drying your hands with a paper towel will reduce the bacterial count on your hands by 45–60%.

For a complete list of videos, visit our video library