This is the second part of the video in which we will finish the topic of vulnerability analysis, qualifying each of the questions of the points ... source