Which of the following is the BEST course of action when using a web application that has known vulnerabilities?
Monitor application level logs.
Deploy host-based intrusion detection.
Deploy an application firewall.
Install anti-spyware software.
Submit