1.4 Given a scenario, analyse the output from common vulnerability assessment tools
Previous1.3 Given a scenario, perform vulnerability management activitiesNext1.5 Explain the threats and vulnerabilities associated with specialised technology
Last updated