What threat categories should you use to prioritize vulnerabilities detected in the pen testing report?

What threat categories should you use to prioritize vulnerabilities detected in the pen testing
report?

What threat categories should you use to prioritize vulnerabilities detected in the pen testing
report?

A.
1, 2, 3, 4, 5

B.
Low, medium, high, serious, critical

C.
Urgent, dispute, action, zero, low

D.
A, b, c, d, e



Leave a Reply 1

Your email address will not be published. Required fields are marked *


Shadow

Shadow

“B” ECSAv8 pg. 661