Giggl60231 Giggl60231 21-04-2022 Computers and Technology contestada The __________ process is designed to find and document vulnerabilities that may be present because there are misconfigured systems in use within the organization.