Watch this video on YouTube
Which of the following is the correct sequence of vulnerability management life cycle?