Which of the following practices is used to mitigate a known security vulnerability?
A.
Application fuzzing
B.
Patch management
C.
Password cracking
D.
Auditing security logs
Which of the following practices is used to mitigate a known security vulnerability?
Which of the following practices is used to mitigate a known security vulnerability?
A.
Application fuzzing
B.
Patch management
C.
Password cracking
D.
Auditing security logs