Which of the following is NOT a key component of an effective vulnerability management program?
Regular scanning and patch management
Eliminating all vulnerabilities
Training and awareness raising
Assessment of risks and prioritization

Information Security Exercises are loading ...