InterviewSolution
Saved Bookmarks
| 1. |
A process by which potential vulnerabilities and threats can be recognized, enumerated, and prioritized from a hypothetical attackers pov is called __ |
|
Answer» A process by which potential vulnerabilities and threats can be recognized, enumerated, and PRIORITIZED from a hypothetical attackers POV is called ___________. |
|