a. Bug protection |
b. Bug bounty |
c. Vulnerability measurement |
d. Vulnerability management |
Answer: Vulnerability management |
a. Bug protection |
b. Bug bounty |
c. Vulnerability measurement |
d. Vulnerability management |
Answer: Vulnerability management |