Section 20.190 Unnecessary Services Flashcards

Objectives 2.5 Explain the purpose of mitigation techniques used to secure the enterprise. Objectives 4.1 Given a scenario, you must be able to apply common security techniques to computing resources. Objectives 4.5 Given a scenario, you must be able to modify enterprise capabilities to enhance security.

1
Q

Services

A

Background applications that operate within the OS executing a range of tasks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly