Which of the following BEST indicates an effective vulnerability management program?
A. Risks are managed within acceptable limits.
B. Threats are identified accurately.
C. Vulnerabilities are managed proactively.
D. Vulnerabilities are reported in a timely manner.
A. Risks are managed within acceptable limits.
B. Threats are identified accurately.
C. Vulnerabilities are managed proactively.
D. Vulnerabilities are reported in a timely manner.