A system within your network has been identified as vulnerable to a particular exploit that allows attackers to execute arbitrary code. Which of the following actions is MOST effective in mitigating this type of vulnerability?
Disable unnecessary services running on the system to reduce the attack surface.
Implement application whitelisting to control which programs are allowed to run.
Perform a code review to identify and manually correct the vulnerable code segments.
Apply the latest security patches for the vulnerable system's software.