Vulnerability, patch, technique - those all sound like they could be related to malware, but the key here is that the question is asking about something that takes advantage of a vulnerability. That narrows it down to exploit.
I'm pretty confident I know the answer to this one. The key features we can customize for incident types are adding new fields, defining how incidents are displayed, and setting reminders for SLAs.
upvoted 0 times
...
Log in to Pass4Success
Sign in:
Report Comment
Is the comment made by USERNAME spam or abusive?
Commenting
In order to participate in the comments you need to be logged-in.
You can sign-up or
login
Selma
4 months agoOdelia
4 months agoCiara
4 months agoCherelle
4 months agoLayla
5 months agoSharita
5 months agoWillodean
5 months agoGarry
5 months agoDonte
5 months agoBrittney
5 months agoArthur
5 months ago