Vulnerability Management Processes
This deck helps students match stages and concepts involved in vulnerability management, including identification, prioritization, remediation, and reporting.
Some options will have multiple correct answers.
Asset inventory
Stakeholder communication
Metrics and trends
Risk assessment
Patching systems
Threat intelligence integration
Mitigation measures
Audit trails
Criticality of assets
Exploitability of vulnerabilities
Configuration changes
Scanning for vulnerabilities
Reporting
Remediation
Identification
Prioritization