Salman, a security professional in an organization, was instructed to identify all potential security weaknesses in the organization and fix them before an attacker can exploit them. In the process, he consulted a third-party consulting firm to run a security audit of the organization’s network. Which of the following types of solutions did Salman implement in the above scenario?