JAVA/Sun Exam Questions

Which two steps have to be performed to configure systems so that they are more resilient to attack?

Which two steps have to be performed to configure systems so that they are more resilient to attack? (Choose two.)

A.
Perform system auditing.

B.
Perform system hardening.

C.
Perform system replication.

D.
Perform a full system backup.

E.
Perform system minimization.