What threat categories should you use to prioritize vulnerabilities detected in the pen testing
report?
A.
1, 2, 3, 4, 5
B.
Low, medium, high, serious, critical
C.
Urgent, dispute, action, zero, low
D.
A, b, c, d, e
What threat categories should you use to prioritize vulnerabilities detected in the pen testing
report?
What threat categories should you use to prioritize vulnerabilities detected in the pen testing
report?
A.
1, 2, 3, 4, 5
B.
Low, medium, high, serious, critical
C.
Urgent, dispute, action, zero, low
D.
A, b, c, d, e
“B” ECSAv8 pg. 661