A security technician has removed the sample configuration files from a database server. Which of
the following application security controls has the technician attempted?

A.
Application hardening
B.
Application baselines
C.
Application patch management
D.
Application input validation