An automatic vulnerability scan has been performed.
Which is the next step of the vulnerability assessment process?
A . Hardening the infrastructure
B . Documenting exceptions
C . Assessing identified exposures
D . Generating reports
Answer: D
Explanation:
Reference: https://securityintelligence.com/a-step-by-step-guide-to-vulnerability-assessment/