which of the following processes to remove unnecessary …
seenagape
To reduce the attack surface of a system, administrators should perform which of the following processes to remove unnecessary software, services, and insecure configuration settings?