To protect publicly accessible systems an organization may c…
To protect publicly accessible systems an organization may configure them to eliminate unnecessary features and functions, reducing potential vulnerabilities. This process is known as ____________.