sydneip7180 sydneip7180
  • 08-01-2024
  • Computers and Technology
contestada

Which security policies are recommended when installing a server?

a) check the cd-rom/dvd/iso by using checksum.
b) use a minimal base installation.
c) Enable firewalls and configure access controls.
d) Regularly update security patches and software.

Respuesta :

Otras preguntas

ILL BRAINLIEST YOU PLEASE HELP ME
On page 8, the author writes, "When, in the course of your day, do you let your mind wander aimlessly?" Which literary device is she using? hyperbole rhetorical
Is x+y is an algebraic expression?
Which of the following is an example of changing gender roles? A. Fewer women worked outside the home during World War II than before the war started. B. Americ
a fish tank is in the shape of an open glass cuboid 30cm deep with a base 16cm by 17cm, these measurements being external. if the glass is 0.5cm thick and its m
PLSSSS YALLLwrite 2-4 sentences about adaptations​
can someone explain this qoutation please "Adolescence is a plaque on the scases"​
Which of the following rules about object pronouns are true?
If you can answer all of this then your a legend (I'm giving you all my points)
Estimate number of jelly beans in 1 litre jar.​