Level N/A
Mechanisms exist to review historical event logs to determine if identified vulnerabilities have been previously exploited.
Mechanisms exist to review historical event logs to determine if identified vulnerabilities have been previously exploited.