Which of the following is the BEST way to validate the results of a vulnerability assessment?
A. Perform a penetration test
B. Perform a root cause analysis
C. Conduct a threat analysis
D. Review security logs
A. Perform a penetration test
B. Perform a root cause analysis
C. Conduct a threat analysis
D. Review security logs