When an operating system is being hardened, it is MOST important for an information security manager to ensure that:
A. system logs are activated
B. default passwords are changed
C. file access is restricted
D. anonymous access is removed
A. system logs are activated
B. default passwords are changed
C. file access is restricted
D. anonymous access is removed