Checking for malware vulnerabilities is a part of a penetration test. The penetration tester will need to manually check many different areas of the system throughout this process. Which of the following is the next step once these checks have been completed?
Comments