Vendors typically ship software applications with security settings disabled by default to ensure a wide range of
interoperability with other applications and devices.
Which of the following should a security administrator perform before deploying new software?
Application white listing
Network penetration testing
Input fuzzing testing
Hardening is the process of securing a system by reducing its surface of vulnerability. Reducing the surface of
vulnerability typically includes removing unnecessary functions and features, removing unnecessary usernames
or logins and disabling unnecessary services.