Which of the following solutions should an administrator use to reduce the risk from an unknown vulnerability in a third-party software application?
A. Sandboxing
B. Encryption
C. Code signing
D. Fuzzing