Which of the following configuration changes does NOT reduce the attack surface A. losing unnecessary network ports B. Configuring data backups in case ransomware encrypts the file system C. Disabling unused OS features and services D. Removing unwanted and unnecessary software