Which vulnerability assessment phase describes the scope of the assessment, identifies and
ranks the critical assets, and creates proper information protection procedures such as
effective planning, scheduling, coordination, and logistics?
A.
Threat-Assessment Phase
B.
Pre-Assessment Phase
C.
Assessment Phase
D.
Post-Assessment Phase