Watch this video on YouTube
Implementing which of the following controls would BEST reduce the impact of a vulnerability that has been exploited?