Which vulnerability assessment phase describes the scope of the assessment, identifies and
ranks the critical assets, and creates proper information protection procedures such as
effective planning, scheduling, coordination, and logistics?
A.
Threat-Assessment Phase
B.
Pre-Assessment Phase
C.
Assessment Phase
D.
Post-Assessment Phase
C
“B” (ECSAv8 Module 09 Vulnerability Analysis page 283)
B