A security technician has removed the sample configuration files from a database server. Which of the
following application security controls has the technician attempted?
A.
Application hardening
B.
Application baselines
C.
Application patch management
D.
Application input validation