Isaca CISM Question Answer
When taking a risk-based approach to vulnerability management, which of the following is MOST important to consider when prioritizing a vulnerability?
Isaca CISM Question Answer
When taking a risk-based approach to vulnerability management, which of the following is MOST important to consider when prioritizing a vulnerability?