ECCouncil Exam Questions

which of the following processes to remove unnecessary software, services, and insecure configuratio

To reduce the attack surface of a system, administrators should perform which of the following
processes to remove unnecessary software, services, and insecure configuration settings?

A.
Harvesting

B.
Windowing

C.
Hardening

D.
Stealthing