1. What is vulnerability assessment?
2. Who is generally involved in a vulnerability assessment?
3.If you were the CISO, what would you like to see in the vulnerability assessment report?
Guidelines:vulnerability assessment
Provide one post of no less than 300 words. Cite sources when applicable.