An IT supervisor plans to improve system settings by referencing industry recommendations while accommodating daily processes. Which approach best fulfills these goals?
Maintain the default settings provided by suppliers, reviewing active ports and services when deemed important
Adopt published references for selected features, validating each system change through supervised checks to keep important functionalities available
Change each device’s parameters as new needs arise, observing the effects after implementation to limit complexity
Rely on input from similar external organizations, leaving most device parameters unchanged for familiarity
Effective system hardening involves referencing proven security guidelines while maintaining daily business operations. This means adopting a change management lifecycle where changes are planned, tested, and validated against functional requirements. Blindly following defaults, improvising, or mirroring others without context undermines both performance and security integrity. Other plans rely heavily on different organizations’ strategies, default vendor setups with limited oversight, or spur-of-the-moment alterations that may create unrecognized gaps or disrupt stability.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is system hardening in IT?
Open an interactive chat with Bash
Why is change management important in IT security?
Open an interactive chat with Bash
What are industry recommendations for improving IT settings?