Watch this video on YouTube
Which of the following methods is the PRIMARY way to address server vulnerabilities?