The PRIMARY purpose of vulnerability assessments is to:
A. detect deficiencies that could lead to a system compromise.
B. provide clear evidence that the system is sufficiently secure.
C. test intrusion detection systems (IDS) and response procedures.
D. determine the impact of potential threats.
A. detect deficiencies that could lead to a system compromise.
B. provide clear evidence that the system is sufficiently secure.
C. test intrusion detection systems (IDS) and response procedures.
D. determine the impact of potential threats.