aloading3148 aloading3148 01-02-2024 Computers and Technology contestada What should administrators perform to reduce a system's attack surface and remove unnecessary software, services, and insecure configuration settings? 1) Harvesting 2) Stealthing 3) Windowing 4) Hardening