Add to Chrome
✅ The verified answer to this question is available below. Our community-reviewed solutions help you understand the material better.
Which of the following are steps in the vulnerability management process. Select two answers.
Install antivirus
Identify vulnerabilities
Catalog organizational assets
Prepare defenses against threats
Assign a CVE® ID
Get Unlimited Answers To Exam Questions - Install Crowdly Extension Now!