Author Question: The final step in the process of initially securing the base operating system is ________. What ... (Read 81 times)

skymedlock

  • Hero Member
  • *****
  • Posts: 561
The final step in the process of initially securing the base operating system is ________.
 
  What will be an ideal response?

Question 2

The most important changes needed to improve system security are to ______.
 
  A. disable remotely accessible services that are not required
   B. ensure that applications and services that are needed are appropriately configured
   C. disable services and applications that are not required
   D. all of the above



abro1885

  • Sr. Member
  • ****
  • Posts: 337
Answer to Question 1

security testing

Answer to Question 2

D



Related Topics

Need homework help now?

Ask unlimited questions for free

Ask a Question
 

Did you know?

Warfarin was developed as a consequence of the study of a strange bleeding disorder that suddenly occurred in cattle on the northern prairies of the United States in the early 1900s.

Did you know?

In 2010, opiate painkllers, such as morphine, OxyContin®, and Vicodin®, were tied to almost 60% of drug overdose deaths.

Did you know?

The people with the highest levels of LDL are Mexican American males and non-Hispanic black females.

Did you know?

The first documented use of surgical anesthesia in the United States was in Connecticut in 1844.

Did you know?

Prostaglandins were first isolated from human semen in Sweden in the 1930s. They were so named because the researcher thought that they came from the prostate gland. In fact, prostaglandins exist and are synthesized in almost every cell of the body.

For a complete list of videos, visit our video library