What is the purpose of the anti-exploit and active adversary techniques mentioned in the given statement?
1) To deny attackers by blocking the exploits and techniques used to distribute malware, steal credentials, and escape detection.
2) To enhance the performance of the system by identifying and eliminating vulnerabilities.
3) To provide additional layers of security to prevent unauthorized access.
4) To improve the overall user experience by reducing the risk of cyber attacks.