Which vulnerability assessment phase describes the scope of the assessment, identifies and ranks the critical assets, and creates proper information protection procedures such as effective planning, scheduling, coordination, and logistics?
- Threat-Assessment Phase
- Pre-Assessment Phase
- Assessment Phase
- Post-Assessment Phase
Reveal Solution Next Question