Which of the following is the MOST important outcome from vulnerability scanning?
A. Prioritization of risks
B. Information about steps necessary to hack the system
C. Identification of back doors
D. Verification that systems are properly configured
A. Prioritization of risks
B. Information about steps necessary to hack the system
C. Identification of back doors
D. Verification that systems are properly configured