header bg

Scan QR code or get instant email to install app

Question:

Which phases of the vulnerability management life cycle is Rose working in if she who is an ethical hacker, has created a report that clearly identifies her findings and recommendations for locking down an organization's systems and patching problems?

A Risk assessment
explanation

Related Information

Comments

Leave a Reply

Your email address will not be published. Required fields are marked *

*