which statement applies to vulnerability management policies