To successfully complete a vulnerability assessment, it is critical that protection systems are well understood. Th is objective includes:
A.
Threat definition, target identification and facility characterization
B.
Threat definition, conflict control and facility characterization
C.
Risk assessment, threat identification and incident review
D.
Threat identification, vulnerability appraisal and access review
Explanation:
A: At the beginning, a good assessment requires the security professional to determine specific protection objectives. These objectives include threat definition, target identification, and facility characteristics. Page 585.