7.1.7 Identify Types Of Vulnerabilities