Analyze the screenshot below. In what order should the vulnerabilities be remediated?
D, C, B, A
C, D, B, A
C, D, A, B
B, A, D, C,
Submit