• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
Free ACCA & CIMA online courses from OpenTuition

Free ACCA & CIMA online courses from OpenTuition

Free Notes, Lectures, Tests and Forums for ACCA and CIMA exams

  • ACCA
  • CIMA
  • FIA
  • OBU
  • Books
  • Forums
  • Ask AI
  • Search
  • Register
  • Login
  • ACCA Forums
  • Ask ACCA Tutor
  • CIMA Forums
  • Ask CIMA Tutor
  • FIA
  • OBU
  • Buy/Sell Books
  • All Forums
  • Latest Topics

June 2025 ACCA Exam Results

Comments & Instant poll >>

20% off ACCA & CIMA Books

OpenTuition recommends the new interactive BPP books for June 2025 exams.
Get your discount code >>

PENETRATION TESTING

Forums › Ask CIMA Tutor Forums › Ask CIMA P3 Tutor Forums › PENETRATION TESTING

  • This topic has 3 replies, 2 voices, and was last updated 1 week ago by Ken Garrett.
Viewing 4 posts - 1 through 4 (of 4 total)
  • Author
    Posts
  • June 16, 2022 at 4:59 pm #658884
    dsodha
    Participant
    • Topics: 18
    • Replies: 13
    • ☆

    What is the purpose of doing vulnerability tracking after a threat has been discovered?

    June 17, 2022 at 6:50 am #658900
    Ken Garrett
    Keymaster
    • Topics: 10
    • Replies: 10595
    • ☆☆☆☆☆

    You might need to better understand that incident but also, where there is one weakness in a system, there could well be more and these need to be identified so that weaknesses can be eliminated.

    June 29, 2025 at 6:58 pm #718074
    dsodha
    Participant
    • Topics: 18
    • Replies: 13
    • ☆

    When they talk about vulnerability tracking in the text, is it the same as penetration testing or the same as vulnerability probing.

    And what is vulnerability assessments?

    I know that vulnerability probing is a part of penetration testing.

    So what is vulnerability tracking and vulnerability assessments.

    June 30, 2025 at 7:56 pm #718086
    Ken Garrett
    Keymaster
    • Topics: 10
    • Replies: 10595
    • ☆☆☆☆☆

    Vulnerability tracking identifies, assesses, prioritises and fixes security vulnerabilities within an organization’s IT infrastructure. Penetration testing can be a way of discovering vulnerabilities and seeing if the fix works properly.

    The term ‘vulnerability assessment’ is sometimes used identically to ‘Vulnerability tracking’ or as in the preceding paragraph, assesses how serious a vulnerability is. That helps to prioritise the tasks of fixing the system.

  • Author
    Posts
Viewing 4 posts - 1 through 4 (of 4 total)
  • You must be logged in to reply to this topic.
Log In

Primary Sidebar

Donate
If you have benefited from our materials, please donate

ACCA News:

ACCA My Exam Performance for non-variant

Applied Skills exams is available NOW

ACCA Options:  “Read the Mind of the Marker” articles

Subscribe to ACCA’s Student Accountant Direct

ACCA CBE 2025 Exams

How was your exam, and what was the exam result?

BT CBE exam was.. | MA CBE exam was..
FA CBE exam was.. | LW CBE exam was..

Donate

If you have benefited from OpenTuition please donate.

PQ Magazine

Latest Comments

  • Kim Smith on AA Chapter 9 Questions
  • Walkera on Basic Variance Analysis part 1 – ACCA Performance Management (PM)
  • kartierclass on AA Chapter 9 Questions
  • revathik on IASB Conceptual Framework – Introduction – ACCA Financial Reporting (FR)
  • Josfel on Relevant cash flows for DCF Taxation (example 4) – ACCA Financial Management (FM)

Copyright © 2025 · Support · Contact · Advertising · OpenLicense · About · Sitemap · Comments · Log in