Skip to main content
Section 8.4 Review Questions
-
What information needs to be collected by a security team when assessing possible vulnerabilities?
-
What is the purpose of the CVE database and how does it help a security team?
-
Give three examples of PII.
You have attempted
1 of
1 activities on this page.