When an operating system is being hardened, it is MOST important for an information security manager to ensure that:
A. default passwords are changed.
B. anonymous access is removed.
C. file access is restricted.
D. system logs are activated.
A. default passwords are changed.
B. anonymous access is removed.
C. file access is restricted.
D. system logs are activated.