Certified Ethical Hacker – CEH – 312-50 – Question180

To reduce the attack surface of a system, administrators should perform which of the following processes to remove unnecessary software, services, and insecure configuration settings?


A.
Harvesting
B. Windowing
C. Hardening
D. Stealthing

Correct Answer: C