A. applications security B. virtual firewall protection C. security events correlation for proactive response D. malware, virus, and worm mitigation
A.has been designedB.had been designedC.was designedD.would be designed