Register
4:59
Stop
CEH - Introduction to Ethical Hacking - Ethical Hacking Concepts
Intermediate
1/5
When conducting a vulnerability assessment, what term describes the process of assigning severity levels to discovered vulnerabilities based on their potential impact?
a.
Vulnerability prioritization
b.
Exploit probability assessment
c.
Risk quantification methodology
d.
Threat impact analysis
Intermediate