An organization still depends on older servers running critical tasks. Which measure best reduces unauthorized activities while preserving key functions?
Restrict unused processes and disconnect inactive systems
Use existing upgrades to maintain system functionality
Manage logs on remote servers to track unusual behavior
Assign advanced privileges for centralized control
Eliminating seldom used processes and links removes openings that could be exploited while maintaining vital services. Continually relying on existing updates may leave known weak points, centralizing all power under one administrator exposes a larger window for abuse, and logging alone does not directly reduce entry points.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are unused processes in a server, and why should they be restricted?
Open an interactive chat with Bash
How does disconnecting inactive systems improve security?
Open an interactive chat with Bash
Why is relying solely on logging insufficient to reduce entry points?