Vulnerability ________ is an important tool for information security management as it identifies all the security weaknesses before an attacker can exploit them.

A. assessment
B. scoring
C. reporting
D. research


Answer: A. assessment

Computer Science & Information Technology

You might also like to view...

The statement or block of statements following the while clause is known as the ____________ of the loop.

a. assembly b. body c. definition d. sequence structure

Computer Science & Information Technology

Using its Global Financing Network, ________ customers can have access to automated credit approval and financing.

(a) Paymentech. (b) eCredit. (c) Clareon. (d) eTime Capital.

Computer Science & Information Technology

PDF files are more commonly used than XPS documents

Indicate whether the statement is true or false

Computer Science & Information Technology

You use the Send to OneNote Button when you have an active screenshot in memory

Indicate whether the statement is true or false

Computer Science & Information Technology