What should administrators perform to reduce a system's attack surface and remove unnecessary software, services, and insecure configuration settings?
1) Harvesting
2) Stealthing
3) Windowing
4) Hardening

Q&A Platform for Education
Platform Explore for Education