What does a vulnerability assessment seek to identfy?
Any issues in a network, application, database or other system before it is used. This is a formal process.
What is the practice of finding vulnerabilities?
Vulnerability management.
Note: The process is, Scan > Patch > Scan > repeating of course
What 3 questions can help scope your vulnerability assessments?
Summarize the vulnerability process in 5 steps