Vulnerability assessment is an examination of the ability of a system or application, including
the current security procedures and controls, to withstand assault.
What does a vulnerability assessment identify?
A.
Disgruntled employees
B.
Weaknesses that could be exploited
C.
Physical security breaches
D.
Organizational structure
B
B