Your organization uses proprietary software developed using legacy coding languages and platforms. The software has been continuously used for several decades and requires several security exceptions, mainly because it cannot run on the newest operating system (OS) version. How can the organization best protect this software while continuing to use it? (Select the two best options.)
A.Network segmentation
B.Vulnerability feeds
C.Compensating controls
D.Patching