Author Question: The final step in the process of initially securing the base operating system is ________. What ... (Read 65 times)

skymedlock

  • Hero Member
  • *****
  • Posts: 561
The final step in the process of initially securing the base operating system is ________.
 
  What will be an ideal response?

Question 2

The most important changes needed to improve system security are to ______.
 
  A. disable remotely accessible services that are not required
   B. ensure that applications and services that are needed are appropriately configured
   C. disable services and applications that are not required
   D. all of the above



abro1885

  • Sr. Member
  • ****
  • Posts: 337
Answer to Question 1

security testing

Answer to Question 2

D



Related Topics

Need homework help now?

Ask unlimited questions for free

Ask a Question
 

Did you know?

Hyperthyroidism leads to an increased rate of metabolism and affects about 1% of women but only 0.1% of men. For most people, this increased metabolic rate causes the thyroid gland to become enlarged (known as a goiter).

Did you know?

People with high total cholesterol have about two times the risk for heart disease as people with ideal levels.

Did you know?

In 1885, the Lloyd Manufacturing Company of Albany, New York, promoted and sold "Cocaine Toothache Drops" at 15 cents per bottle! In 1914, the Harrison Narcotic Act brought the sale and distribution of this drug under federal control.

Did you know?

Studies show that systolic blood pressure can be significantly lowered by taking statins. In fact, the higher the patient's baseline blood pressure, the greater the effect of statins on his or her blood pressure.

Did you know?

There are more bacteria in your mouth than there are people in the world.

For a complete list of videos, visit our video library