Multiple Choice
A systems administrator was tasked with decommissioning a server that contains sensitive data. The systems administrator powered down the server so it was no longer accessible from the network. Two weeks later, during an investigation by security, it is discovered that an employee within the company accessed the server that morning and attempted to access the restricted data. Physical security logs show no one entered the server room. Which of the following hardening techniques was MOST likely neglected on this server?
A) Enabling intrusion detection
B) Stopping unneeded services
C) Installing only required software
D) Disabling WOL
Correct Answer:

Verified
Correct Answer:
Verified
Q574: A Unix server completes POST successfully. The
Q575: Which of the following is the MOST
Q576: Which of the following hypervisors is physically
Q577: Which of the following is a requirement
Q578: An administrator was tasked to enforce disk
Q580: Users have reported that they cannot access
Q581: Which of the following will correctly map
Q582: A technician is troubleshooting a server that
Q583: A user was set up with a
Q584: Which of the following BEST describes a