Is it possible to locate all vulnerabilities in a network? In other words, can one make an authoritative list of those vulnerabilities? Defend your response.
Answers
Answered by
0
Answer:
other words, can one make an authoritative list of those vulnerabilities
Similar questions