What two are triggers for an organization to perform a vulnerability assessment? (Choose two.)
A. only when the network is initially deployed
B. when new users are brought on-board
C. when a new technology or software is planned to be deployed
D. when software or hardware updates are released.