Uh-Oh...
Identifying vulnerabilities in the network is incorrect.
Explanation :
Understanding the execution phase helps in preparing defenses against various methods attackers use, such as malware, scripts, and manual actions.