A security specialist has implemented antivirus software and whitelisting controls to prevent malware and unauthorized application installation on the company
systems. The combination of these two technologies is an example of which of the following?

A.
Defense in depth
B.
Vulnerability scanning
C.
Application hardening
D.
Anti-malware