Professional Documents
Culture Documents
Q 08 - Solution Q 08 - Solution
Q 08 - Solution Q 08 - Solution
Q 08 - solution
8) Discuss configuration changes and techniques you can use to harden a Linux system
against security attacks and vulnerabilities?