Scenario: An organization has recently been penetration-tested by a security company. The
findings have indicated that the NetScaler device is responding to requests revealing web
server information within the HTTP response headers. Which NetScaler feature can a
network engineer use to prevent this information from being leaked to a potential malicious
user?

A.
Responder
B.
Web Logging
C.
Rewrite
D.
URL Transformation