It's best to choose C. Patch each operating container separately, then test the program.
One of the greatest methods to prevent zero-day attacks is to install a web application firewall (WAF) on the network edge. A WAF inspects all incoming traffic and filters out harmful inputs that might target security holes. Phishing. Email and text message campaigns known as phishing scams are among the most popular types of social engineering attacks. They are intended to make recipients feel hurried, curious, or afraid. To identify errors and locate attacks on information systems that have already occurred, a detective control is created.
Learn more about security here-
https://brainly.com/question/27625282
#SPJ4