Watch this video on YouTube
Which of the following is a secure practice for resource management in software applications?