Which three activities within the plan phase are performed when assessing network vulnerabilities and identifying steps needed to address security threats and attacks? (Choose three.)
A.
Identify, Analyze and Document Existing Network Vulenrabilities
B.
Document the existing Network Environment
C.
Produce Network Security Specifications and Requirements
D.
Assess Current Network Infrastructure and Network Security Procedures
E.
Produce Security Vulnerability Report
F.
Document the Network Vulnerabilities and Determine the level of Criticality for remediation