Which of the following security processes will BEST prevent the exploitation of system vulnerabilities?
A. Patch management
B. Log monitoring
C. Antivirus software
D. Intrusion detection
A. Patch management
B. Log monitoring
C. Antivirus software
D. Intrusion detection