Which of the following is the MOST important action when using a web application that has recognized vulnerabilities?
A. Deploy an application firewall.
B. Deploy host-based intrusion detection.
C. Install anti-spyware software.
D. Monitor application level logs.
A. Deploy an application firewall.
B. Deploy host-based intrusion detection.
C. Install anti-spyware software.
D. Monitor application level logs.