The First Critical Step in Securing a System Is to Secure
The first critical step in securing a system is to secure the __________.
A)base operating system
C)malware protection mechanisms
D)remote access privileges
The following steps should be used to secure an operating system:
A)test the security of the basic operating system
B)remove unnecessary services
C)install and patch the operating system
D)all of the above
__________ applications is a control that limits the programs that can execute on the system to just those in an explicit list.
Cryptographic file systems are another use of _______.