## Task 3 * Should clarify and ask more about details, what should be returned * Clarify what should be told about vulnerabilities * Recommend using different tools to give more support for findings * Ask about accuracy of the findings * Ask precisely how default ciphers have been used and what is prioritized ## Task 4 * Verify in different environments that proxy works out of the box if only following the instructions * Clarify questions regarding to "data analysis"
Task 3
Task 4