Below are the various steps constituting the vulnerability management life cycle. 1) Remediation 2) Identify assets and create a baseline 3) Verification 4) Monitor 5) Vulnerability scan 6) Risk assessment Arrange the steps in the correct sequence for an effective vulnerability management process.