Answer:
Vulnerability Mapping involves associating identified components with potential vulnerabilities based on their impact and likelihood.
Vulnerability Mapping involves associating identified components with potential vulnerabilities based on their impact and likelihood.
You may be interested in:
Web Security MCQs