header bg

Scan QR code or get instant email to install app


Which phases of the vulnerability management life cycle is Rose working in if she who is an ethical hacker, has created a report that clearly identifies her findings and recommendations for locking down an organization's systems and patching problems?

A Risk assessment

Related Information