Scenario: An organization has recently been penetration-tested by a security company. The findings have
indicated that the NetScaler device is responding to requests revealing web server information within the
HTTP response headers.
Which NetScaler feature can a network engineer use to prevent this information from being leaked to a
potential malicious user?
A.
Rewrite
B.
Responder
C.
Web Logging
D.
URL Transformation