A security technician has removed the sample configuration files from a database server. Which of the following application security controls has the technician attempted?
A. Application hardening
B. Application baselines
C. Application patch management
D. Application input validation
Answer: A. Application hardening
Computer Science & Information Technology
You might also like to view...
The default typeface name used in the Normal template is ________
Fill in the blank(s) with correct word
Computer Science & Information Technology
Application and system security's real dilemma is that it complicates the issue of ____.
A. group dynamics B. individual needs C. organizational requirements D. scope creep
Computer Science & Information Technology