✅ The verified answer to this question is available below. Our community-reviewed solutions help you understand the material better.
Which step in the Vulnerability Management Life Cycle performs inventory of all assets across the network and identifies host details, including operating system and open services?