A security technician has removed the sample configuration files from a database server. Which of the following application security controls has the technician attempted?

A. Application hardening
B. Application baselines
C. Application patch management
D. Application input validation

Answer: A. Application hardening

Computer Science & Information Technology

You might also like to view...

The default typeface name used in the Normal template is ________

Fill in the blank(s) with correct word

Computer Science & Information Technology

Application and system security's real dilemma is that it complicates the issue of ____.

A. group dynamics B. individual needs C. organizational requirements D. scope creep

Computer Science & Information Technology