While troubleshooting a network problem, a technician realized it could be resolved by opening a port on a firewall. The technician opened the port and verified the system was now working. However, an attacker accessed this port and launched a successful attack. What could have prevented this problem?A. Patch management processes
B. Vulnerability management processes
C. Configuration management processes
D. Change management processes