Explanation should include vulnerabilities connected to

Process/Skill Questions: