Direct device-hardening techniques (modifying the device itself): A (disabling unused ports), E (changing default passwords), stand out.
Network-wide or monitoring practices: B (scanning) and C (log monitoring) are more about ongoing security management, not hardening the device. D (SSO) is about authentication, not device configuration F (least privilege on the device) may be a good choice too but. The best device-hardening techniques from the list are A and E, as they are universally recognized, directly applicable to securing the device, and foundational to reducing vulnerabilities.
upvoted 3 times
...
This section is not available anymore. Please use the main Exam Page.N10-009 Exam Questions
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
AriGarcia
1 month, 3 weeks ago