A security specialist has completed a vulnerability assessment for a network and applied the most
current software patches. The next step before placing the network back into operation would be
to:
A.
conduct a follow-up vulnerability analysis
B.
update the baseline
C.
perform penetration testing
D.
test the essential functionality