ethical-hacker video for in which of the following types of vulnerability assessment does an organization assess the assets situated at multiple locations, such
In which of the following types of vulnerability assessment does an organization assess the assets situated at multiple locations, such as client and server applications, simultaneously through appropriate synchronization techniques?