Which of the following are considered device-hardening techniques? (Choose two.)

Group of answer choices

Requiring complex passwords

Installing antispyware software

Disabling Bluetooth

Enabling single sign-on

1 answer

The two options that are considered device-hardening techniques are:

  1. Requiring complex passwords - This is a security measure that helps protect the device from unauthorized access by ensuring that passwords are harder to guess.

  2. Disabling Bluetooth - This reduces the attack surface of the device by preventing unauthorized connections and potential exploits via Bluetooth.

The other options, while they contribute to security, are not directly classified as device-hardening techniques.