In a security context, which action can you take to address compliance?
A.
Implement rules to prevent a vulnerability
B.
Correct or counteract a vulnerability
C.
Reduce the severity of a vulnerability
D.
Follow directions from the security appliance manufacturer to remediate a vulnerability