A reference container usually contains

asset profile.
risk score.
vulnerability catalog.
all of the above.


vulnerability catalog.

Computer Science & Information Technology

You might also like to view...

Describe the individual steps that make up the software life cycle. What is the life cycle’s significance in relation to the software engineering process?

What will be an ideal response?

Computer Science & Information Technology

If no exceptions are thrown in a try block, where does control proceed to after the try block completes execution?

What will be an ideal response?

Computer Science & Information Technology

Database ________ such as tables, queries, forms and reports are the basic parts of a database that the user works with

Fill in the blank(s) with correct word

Computer Science & Information Technology

Describe the concept of a virtual switch.

What will be an ideal response?

Computer Science & Information Technology