Which method is leveraged by system administrators in an operating system to prevent the execution of unauthorized software, regardless of whether it is malicious?
Application whitelisting
Restricting the allocation of system resources to the software
Implementing strict file permissions
Allowing automatic administrative privilege elevation