10. Apply the correct response to the vulnerability (AC 2.3)
Previous9. Demonstrate the steps to be taken when a vulnerability has been identified (AC 2.2)Next11. Develop an appropriate communication to mitigate future vulnerabilities (AC 2.4)
Last updated