Watch this video on YouTube
After performing a tool-based vulnerability assessment and identifying issues, you begin analyzing them and determine that they are not actual vulnerabilities. How would you characterize these issues?