A network administrator is evaluating methods to protect the corporate network from external attackers aiming to exploit publicly known software vulnerabilities. Which of the following practices is the BEST approach to minimize the risk of such attacks?
Applying regular patches and firmware updates to systems and applications
Configuring a honeypot to attract and analyze attacker behavior
Deploying intrusion detection systems to monitor traffic patterns
Enforcing a policy for frequent password changes among users