2.3 Apply the correct response to the vulnerability