Scenario: An organization has recently been penetration-tested by a security company. The
findings have indicated that the NetScaler device is responding to requests revealing web server
information within the HTTP response headers. Which NetScaler feature can a network engineer
use to prevent this information from being leaked to a potential malicious user?

A.
Rewrite
B.
Responder
C.
Web Logging
D.
URL Transformation