header bg

Question:

Which phases of the vulnerability management life cycle is Rose working in if she who is an ethical hacker, has created a report that clearly identifies her findings and recommendations for locking down an organization's systems and patching problems?

A Risk assessment
Explaination