header bg

Question:

What will you call these issues that Mr. Omkar performed tool-based vulnerability assessment and found two vulnerabilities, he found that these issues are not true vulnerabilities during analysis?

A False positives
Explaination