DRAG DROP - Drag and drop the mitigation steps from the left onto the vulnerabilities they mitigate on the right.
Select and Place: