During a vulnerability assessment, it is discovered that a critical server running a legacy system cannot be patched immediately due to dependencies on outdated software. Which of the following BEST describes a compensating control that can be implemented to mitigate the risk?
Increase logging and monitoring to detect any exploit attempts.
Implement a firewall rule to block specific attack vectors targeting the vulnerability.
Disable unused services on the legacy server.
Conduct routine vulnerability scans to detect potential threats.