Which phases of the vulnerability management life cycle is Rose working in if she who is an ethical hacker, has created a report that clearly identifies her findings and recommendations for locking down an organization's systems and patching problems?