Which of the following items is unique to the N-tier architecture method of designing software applications?
which of the following processes to remove unnecessary software, services, and insecure configuration settings?