Which of the following is a risk of conducting a vulnerability assessment?
A disruption of business operations
Unauthorized access to the system
Reports of false positives
Finding security gaps in the system
Submit