Watch this video on YouTube
What should a vulnerability report include if a cybersecurity analyst wants it to reflect the assets scanned accurately?