A set of standardized system images with a pre-defined set of applications is used to build enduser workstations. The security administrator has scanned every workstation to create a current
inventory of all applications that are installed on active workstations and is documenting which
applications are out-of-date and could be exploited. The security administrator is determining the:
A.
Attack surface.
B.
Application hardening effectiveness.
C.
Application baseline.
D.
OS hardening effectiveness.