Identify the type of vulnerability
Identify the type of vulnerability Not at all important
Identify the type of vulnerability Not so important
Identify the type of vulnerability Somewhat important
Identify the type of vulnerability Very important
Identify the type of vulnerability Extremely important
Spot the security defect
Spot the security defect Not at all important
Spot the security defect Not so important
Spot the security defect Somewhat important
Spot the security defect Very important
Spot the security defect Extremely important
Fix the security defect
Fix the security defect Not at all important
Fix the security defect Not so important
Fix the security defect Somewhat important
Fix the security defect Very important
Fix the security defect Extremely important
Hint of potential security defects
Hint of potential security defects Not at all important
Hint of potential security defects Not so important
Hint of potential security defects Somewhat important
Hint of potential security defects Very important
Hint of potential security defects Extremely important
Choose avatar
Choose avatar Not at all important
Choose avatar Not so important
Choose avatar Somewhat important
Choose avatar Very important
Choose avatar Extremely important
Check the code
Check the code Not at all important
Check the code Not so important
Check the code Somewhat important
Check the code Very important
Check the code Extremely important