Kyle Belote

62%
Flag icon
Assessments often use a variety of scans and penetration tests, all discussed in this section. A vulnerability assessment typically includes the following high-level steps: •       Identify assets and capabilities. •       Prioritize assets based on value. •       Identify vulnerabilities and prioritize them. •       Recommend controls to mitigate serious vulnerabilities.
CompTIA Security+ Get Certified Get Ahead: SY0-501 Study Guide
Rate this book
Clear rating
Open Preview