Which of the following BEST represents the goal of a vulnerability assessment?
A.
To test how a system reacts to known threats
B.
To reduce the likelihood of exploitation
C.
To determine the system’s security posture
D.
To analyze risk mitigation strategies