Watch this video on YouTube
Which component of a software inventory BEST enables the identification and mitigation of known vulnerabilities?