2.2 Favorable Vulnerability