Which of the following processes would the scan results MOST likely feed into?
An IS auditor is reviewing an organization’s network vulnerability scan results. Which of the following processes would the scan results MOST likely feed into?A . Firewall maintenanceB . Patch managementC . Incident responseD . Traffic managementView AnswerAnswer: A