Skip to main content

Section 8.4 Review Questions

  1. What information needs to be collected by a security team when assessing possible vulnerabilities?
  2. What is the purpose of the CVE database and how does it help a security team?
  3. Give three examples of PII.
You have attempted 1 of 1 activities on this page.