Which of the following strategies will mitigate the risk of a zero-day vulnerability MOST efficiently?
A . Using only open-source technologies
B . Keeping all resources up to date
C . Creating a standby environment with a different cloud provider
D . Having a detailed incident response plan
Answer: D