Question
Which of the following are considered device-hardening techniques? (Choose two.)
Group of answer choices
Requiring complex passwords
Installing antispyware software
Disabling Bluetooth
Enabling single sign-on
Group of answer choices
Requiring complex passwords
Installing antispyware software
Disabling Bluetooth
Enabling single sign-on
Answers
GPT-4o mini
The two options that are considered device-hardening techniques are:
1. **Requiring complex passwords** - This is a security measure that helps protect the device from unauthorized access by ensuring that passwords are harder to guess.
2. **Disabling Bluetooth** - This reduces the attack surface of the device by preventing unauthorized connections and potential exploits via Bluetooth.
The other options, while they contribute to security, are not directly classified as device-hardening techniques.
1. **Requiring complex passwords** - This is a security measure that helps protect the device from unauthorized access by ensuring that passwords are harder to guess.
2. **Disabling Bluetooth** - This reduces the attack surface of the device by preventing unauthorized connections and potential exploits via Bluetooth.
The other options, while they contribute to security, are not directly classified as device-hardening techniques.