Complete the following statement: One of the general rules of secure Configuration Management is to remove/disable _____.

  1. unused request types or methods

  2. manuals and installation documents

  3. examples

  4. All


Correct Option: D

AI Explanation

To answer this question, you need to understand the general rules of secure Configuration Management. Let's go through each option to understand why it is correct or incorrect:

Option A) Unused request types or methods - This option is incorrect. While it is good practice to remove/disable unused request types or methods, it is not the only general rule of secure Configuration Management.

Option B) Manuals and installation documents - This option is incorrect. While it is important to secure manuals and installation documents, it is not the only general rule of secure Configuration Management.

Option C) Examples - This option is incorrect. While it is important to remove/disable examples to prevent potential security vulnerabilities, it is not the only general rule of secure Configuration Management.

Option D) All - This option is correct. One of the general rules of secure Configuration Management is to remove/disable all unused request types or methods, manuals and installation documents, and examples. By removing or disabling these elements, the attack surface of the system is reduced, limiting potential vulnerabilities and improving overall security.

The correct answer is D) All. This option is correct because it encompasses all the general rules of secure Configuration Management, which include removing/disabling unused request types or methods, manuals and installation documents, and examples.

Find more quizzes: