The vulnerability assessment process typically includes which four activities? (Choose four.)
A. device discovery
B. service enumeration
C. patching the software and firmware
D. reimaging the infected hosts
E. scanning
F. validation
The vulnerability assessment process typically includes which four activities? (Choose four.)
A. device discovery
B. service enumeration
C. patching the software and firmware
D. reimaging the infected hosts
E. scanning
F. validation