Which of the following should be included in an audit report?

a. Any security vulnerabilities found
b. The machines affected by these vulnerabilities
c. Recommended steps to correct the vulnerabilities
d. All the above

ANS: D

Computer Science & Information Technology

You might also like to view...

Facebook and Twitter are popular examples of ________ networks

Fill in the blank(s) with correct word

Computer Science & Information Technology

Paste options are displayed by clicking the Paste arrow

Indicate whether the statement is true or false

Computer Science & Information Technology