A vulnerability assessment has identified a weakness in a critical BES Cyber System. The system is used to control energy distribution and must be kept secure. What steps should be prioritized to mitigate this vulnerability while minimizing downtime?
(Select three)
Response: