Giggl60231 Giggl60231 Today at 8:26 AM Computers and Technology Answered The __________ process is designed to find and document vulnerabilities that may be present because there are misconfigured systems in use within the organization.