Vendors typically ship software applications with security settings disabled by default to ensure a wide range of
interoperability with other applications and devices.
Which of the following should a security administrator perform before deploying new software?

A.
Application white listing
B.
Network penetration testing
C.
Application hardening
D.
Input fuzzing testing
Explanation:
Hardening is the process of securing a system by reducing its surface of vulnerability. Reducing the surface of
vulnerability typically includes removing unnecessary functions and features, removing unnecessary usernames
or logins and disabling unnecessary services.