An IT security technician needs to establish host based security for company workstations. Which of the
following will BEST meet this requirement?
Implement IIS hardening by restricting service accounts.
Implement database hardening by applying vendor guidelines.
Implement perimeter firewall rules to restrict access.
Implement OS hardening by applying GPOs.
Hardening is the process of securing a system by reducing its surface of vulnerability. Reducing the surface of
vulnerability typically includes removing or disabling unnecessary functions and features, removing or disabling
unnecessary user accounts, disabling unnecessary protocols and ports, and disabling unnecessary services.
This can be implemented using the native security features of an operating system, such as Group Policy