He requires information regarding the actions that can be taken in response to a cyber attack.