Vulnerability Management Processes
This deck helps students match stages and concepts involved in vulnerability management, including identification, prioritization, remediation, and reporting.
Some options will have multiple correct answers.
Stakeholder communication
Configuration changes
Asset inventory
Patching systems
Threat intelligence integration
Scanning for vulnerabilities
Audit trails
Metrics and trends
Mitigation measures
Exploitability of vulnerabilities
Criticality of assets
Risk assessment
Prioritization
Remediation
Identification
Reporting