If a network administrator is conducting a security review of network devices, which of the following actions should be taken to adhere to security best practices for reducing potential attack vectors?
Disable any services or daemons that are not being used on the network devices.
Implement a firewall to monitor and filter incoming and outgoing network traffic.
Change default device passwords to complex, unique credentials.
Regularly update firmware on all network devices to patch vulnerabilities.