Which four activities?

The vulnerability assessment process typically includes which four activities? (Choose four.)
A. device discovery
B. service enumeration
C. patching the software and firmware
D. reimaging the infected hosts
E. scanning
F. validation

cisco-exams

Leave a Reply

Your email address will not be published. Required fields are marked *


The reCAPTCHA verification period has expired. Please reload the page.