Mr. Omkar performed tool-based vulnerability assessment and found two vulnerabilities. During analysis, he found that these issues are not true vulnerabilities.
What will you call these issues?
A. False positives
B. True negatives
C. True positives
D. False negatives
What will you call these issues?
A. False positives
B. True negatives
C. True positives
D. False negatives