There are points in a system's life cycle that serve as milestones for security management. Which of the following is a valid milestone? a) When the operating system or application software is installed b) When a user initially uses a newly installed application c) When exiting an application d) When temporarily stopping a service