Which of the following allows organizations to identify and remediate vulnerabilities before the public is aware of it, thus reducing the spread and intensity of abuse?
a. Bug Bounty
b. Enumeration
c. Vulnerability Mapping
d. Discovery