adplus-dvertising
frame-decoration

Question

Which of the following is an example of a hardening technique?

a.

Installing more software for added functionality

b.

Keeping all server ports open

c.

Enabling guest access

d.

Disabling unused services

Posted under Cloud Computing

Answer: (d).Disabling unused services Explanation:Disabling unused services is an example of a hardening technique.

Engage with the Community - Add Your Comment

Confused About the Answer? Ask for Details Here.

Know the Explanation? Add it Here.

Q. Which of the following is an example of a hardening technique?

Similar Questions

Discover Related MCQs

Q. What is the process of removing unnecessary software from a system to limit potential vulnerabilities called?

Q. What is a virtual server image also known as?

Q. What is the primary benefit of the Single Sign-On (SSO) mechanism?

Q. Which scenario is the SSO mechanism particularly useful for?

Q. When are the credentials provided by the cloud service consumer in SSO typically valid?

Q. What does the SSO mechanism establish to persist authentication across cloud services?

Q. What challenge does the SSO mechanism help address?

Q. What is the main purpose of the Single Sign-On (SSO) mechanism?

Q. Which threats does the IAM mechanism primarily help counter?

Q. Which IAM component is responsible for creating new user identities, resetting passwords, and managing privileges?

Q. What does the authorization component of IAM define?

Q. What is the main focus of the Identity and Access Management (IAM) mechanism?

Q. Which threat does the Public Key Infrastructure (PKI) mechanism primarily help counter?

Q. What contributes to establishing the credibility of a Certificate Authority ( CA )?

Q. What is the benefit of larger organizations acting as their own Certificate Authorities (CAs)?

Q. What is the purpose of digitally signing digital certificates?

Q. Who usually issues digital certificates in a PKI?

Q. How are digital certificates typically verified for validity?

Q. What is the role of digital certificates in PKIs?

Q. What is the primary purpose of the Public Key Infrastructure (PKI) mechanism?