Which of the following actions is the most crucial when a zero-day vulnerability is discovered in a critical system?
Wait for the vendor to release an official patch.
Reconfigure other security settings in the network.
Implement compensating controls to mitigate the risk.
Notify all stakeholders about the vulnerability.