Author Question: The final step in the process of initially securing the base operating system is ________. What ... (Read 74 times)

skymedlock

  • Hero Member
  • *****
  • Posts: 561
The final step in the process of initially securing the base operating system is ________.
 
  What will be an ideal response?

Question 2

The most important changes needed to improve system security are to ______.
 
  A. disable remotely accessible services that are not required
   B. ensure that applications and services that are needed are appropriately configured
   C. disable services and applications that are not required
   D. all of the above



abro1885

  • Sr. Member
  • ****
  • Posts: 337
Answer to Question 1

security testing

Answer to Question 2

D



Related Topics

Need homework help now?

Ask unlimited questions for free

Ask a Question
 

Did you know?

Malaria was not eliminated in the United States until 1951. The term eliminated means that no new cases arise in a country for 3 years.

Did you know?

The first-known contraceptive was crocodile dung, used in Egypt in 2000 BC. Condoms were also reportedly used, made of animal bladders or intestines.

Did you know?

About 600,000 particles of skin are shed every hour by each human. If you live to age 70 years, you have shed 105 pounds of dead skin.

Did you know?

Earwax has antimicrobial properties that reduce the viability of bacteria and fungus in the human ear.

Did you know?

Asthma-like symptoms were first recorded about 3,500 years ago in Egypt. The first manuscript specifically written about asthma was in the year 1190, describing a condition characterized by sudden breathlessness. The treatments listed in this manuscript include chicken soup, herbs, and sexual abstinence.

For a complete list of videos, visit our video library