Vendors typically ship software applications with security settings disabled by default to ensure a
wide range of interoperability with other applications and devices. A security administrator should
perform which of the following before deploying new software?
A.
Application white listing
B.
Network penetration testing
C.
Application hardening
D.
Input fuzzing testing