Which of the following best practices is used to fix a zero-day vulnerability on Linux?