4:59
Stop
CEH - Introduction to Ethical Hacking - Ethical Hacking Concepts
Intermediate
1/5
When conducting a vulnerability assessment, what term describes the process of assigning severity levels to discovered vulnerabilities based on their potential impact?
Intermediate