While troubleshooting a network problem, a technician realized it could be resolved by opening a port on a firewall. The technician opened the port and verified the system was now working. However, an attacker accessed this port and launched a successful attack. What could have prevented this problem?A. Patch management processes
 B. Vulnerability management processes
 C. Configuration management processes
 D. Change management processes