Which of the following is a deployment concept that can be used to ensure only the required OS access is exposed to software applications?
A. Staging environment
B. Sandboxing
C. Secure baseline
D. Trusted OS
Which of the following is a deployment concept that can be used to ensure only the required OS access is exposed to software applications?
A. Staging environment
B. Sandboxing
C. Secure baseline
D. Trusted OS