Perform vulnerability management activities and analyze the output from common vulnerability assessment tools.
Examples: active versus passive scanning, mapping, enumeration, criticality of assets, validation outcomes (true positive, false positive, true negative, false negative), baseline configuration, patching, hardening, scanning parameters, web application scanners, wireless and infrastructure vulnerability scanners