After performing an audit and review of the network security policies, Tom changes the administrator account name and password, requires all users to create new strong passwords, removes all unused and unneeded user accounts, and disable all unnecessary services running on the network serves. What process has Tom just completed?
B. Detection and prevention control
(this multiple choice question has been scrambled)