3.5 Useless features

The more useless features are enabled, the more likely they (collectively) can contain security flaws or be configured improperly. As a result, a computer system that has many useless options enabled is less secure than a computer system that only has a small number of useful options enabled.