During a routine vulnerability assessment, a security analyst discovers a high-severity vulnerability in an essential web application. Which of the following actions best ensures the availability of the application while the vulnerability is being remediated?
Implement a WAF rule to block exploit attempts.
Monitor network traffic for potential exploit attempts.
Patch the application after appropriate testing.
Take the application offline until the vulnerability is patched.