With no explanation, label text_A→text_B with either "not_related" or "related".
text_A: Bobby Moore was a professional wrestler.
text_B: Vulnerability assessment is a process of defining , identifying and classifying the security holes in information technology systems .. information technology. information technology. An attacker can exploit a vulnerability to violate the security of a system .. vulnerability. Vulnerability ( computing ). Some known vulnerabilities are Authentication Vulnerability , Authorization Vulnerability and Input Validation Vulnerability .
not_related.