Which of the following actions are performed during system hardening? - ProProfs Discuss
Topics
Products
Follow Us:

Which of the following actions are performed during system hardening?



A. MAC filtering
B. Disabling unnecessary services
C. Port security
D. 802.1x authentication

This question is part of CompTIA Security+ (SY0-301) Practice Exam
Asked by Sebastiano, Last updated: May 01, 2020

+ Answer
Request

1 Answer

Sebastiano

Sebastiano

Answered Mar 06, 2018

Disabling unnecessary services

System hardening involves disabling unnecessary services and uninstalling unnecessary software from the system. System hardening also involves disabling unused accounts and patching the system. The rest of the answers are incorrect because they are all network hardening techniques and not system hardening techniques. MAC filtering controls which systems can send data to other systems, port security controls which systems can connect to a port by MAC address, and 802.1x controls who has access to a wired or wireless network by using a central authentication server.
 

Search for Google images
Select a recommended image
Upload from your computer
Search for Google images
Select a recommended image
Upload from your computer
Search for Google images
Select a recommended image
Upload from your computer

Email Sent
We have sent an email to your address "" with instructions to reset your password.