Which of the following would be the BEST action to perform when conducting a corporate vulnerability assessment?
A.
Document scan results for the change control board.
B.
Organize data based on severity and asset value.
C.
Examine the vulnerability data using a network analyzer.
D.
Update antivirus signatures and apply patches.