The role of the ____________________ in an evaluation of a vulnerability is to prepare all of the information necessary to help the appropriate manager make the right decision and then ensure that information gets to the responsible individual.

Fill in the blank(s) with the appropriate word(s).

security analyst

Computer Science & Information Technology

You might also like to view...

The second and subsequent fields you choose to sort by are called ________ fields

Fill in the blank(s) with correct word

Computer Science & Information Technology

Right-clicking a button on the taskbar produces a ________ displaying destinations and tasks

A) path B) contextual tab C) Jump List D) shortcut menu

Computer Science & Information Technology