Which three activities within the plan phase are performed when assessing network vulnerabilities and identifying steps needed to address security threats and attacks? (Choose three.)
A.
Document the existing network environment.
B.
Identify, analyze, and document existing network vulnerabilities.
C.
Assess current network infrastructure and network security procedures.
D.
Produce network security specifications and requirements.
E.
Document the network vulnerabilities and determine the level of criticality for remediation.
F.
Produce security vulnerability report.