Which of the following is the MOST relevant risk indicator after a penetration test?
A. Lists of hosts vulnerable to remote exploitation attacks
B. Details of vulnerabilities and recommended remediation
C. Lists of target systems on the network identified and scanned for vulnerabilities
D. Details of successful vulnerability exploitations
A. Lists of hosts vulnerable to remote exploitation attacks
B. Details of vulnerabilities and recommended remediation
C. Lists of target systems on the network identified and scanned for vulnerabilities
D. Details of successful vulnerability exploitations