After conducting a vulnerability scan, you are tasked with producing a report for the IT management team that outlines the findings and suggests a course of action. Which of the following elements is MOST crucial to include in your report to ensure proper prioritization and subsequent action?
Recurrence intervals of each vulnerability without including a current risk assessment.
A complete list of affected hosts, without detailing the specific vulnerabilities or risk associated with them.
Risk score for each vulnerability identified, to ensure proper prioritization of remediation efforts.
Recommendations for mitigation covering all potential vulnerabilities, not just the ones identified in the scan.