An administrator has a system hardening policy to only allow network access to certain services,
to always use similar hardware, and to protect from unauthorized application configuration
changes.
Which of the following technologies would help meet this policy requirement? (Select TWO).
A.
Spam filter
B.
Solid state drives
C.
Management interface
D.
Virtualization
E.
Host firewall