Vulnerability, patch, technique - those all sound like they could be related to malware, but the key here is that the question is asking about something that takes advantage of a vulnerability. That narrows it down to exploit.
I'm pretty confident I know the answer to this one. The key features we can customize for incident types are adding new fields, defining how incidents are displayed, and setting reminders for SLAs.
upvoted 0
times
...
Log in to Pass4Success
Sign in:
Report Comment
Is the comment made by USERNAME spam or abusive?
Commenting
In order to participate in the comments you need to be logged-in.
You can sign-up or
login
Selma
5 months agoOdelia
6 months agoCiara
6 months agoCherelle
6 months agoLayla
6 months agoSharita
6 months agoWillodean
6 months agoGarry
6 months agoDonte
6 months agoBrittney
7 months agoArthur
7 months ago