If a network administrator is conducting a security review of network devices, which of the following actions should be taken to adhere to security best practices for reducing potential attack vectors?
Implement a firewall to monitor and filter incoming and outgoing network traffic.
Regularly update firmware on all network devices to patch vulnerabilities.
Disable any services or daemons that are not being used on the network devices.
Change default device passwords to complex, unique credentials.