Multiple Choice
To reduce the attack surface of a system, administrators should perform which of the following processes to remove unnecessary software, services, and insecure configuration settings?
A) Harvesting
B) Windowing
C) Hardening
D) Stealthing
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q8: A common cryptographical tool is the use
Q9: Which of the following conditions must be
Q10: When comparing the testing methodologies of Open
Q11: Which of the following tools would be
Q12: Jacob is a penetration tester at TechSoft
Q14: While testing the company's web applications, a
Q15: Advanced encryption standard is an algorithm used
Q16: Which type of antenna is used in
Q17: Moses, a professional hacker, attempts to overwhelm
Q18: Joe works as an engagement team lead