. Execute Summary [ Overall paragraph of the the numer of devices that u scanned and how many vulnerabilities that you had found for each severity category : High, Medium, Low / Critical, Severe, Moderate. Summarize the Pentest successful exploitation and the Impact of it towards the companies security posture. ] .