In a security context, which action can you take to address compliance?
A.
Implement rules to prevent a vulnerability.
B.
Correct or counteract a vulnerability.
C.
Reduce the severity of a vulnerability.
D.
Follow directions from the security appliance manufacturer to remediate a vulnerability.