- documenting the security plan
- assigning business value to assets
- developing a network baseline
- determining a risk profile
Explanation: During the discovery step of the vulnerability management life cycle, an inventory of all network assets is made. A network baseline is developed, and security vulnerabilities are identified.
More Questions: CCNA SECFND 210-250 Dumps – Certification Practice Exam Answers
More Questions: Modules 21 – 23: Cryptography and Endpoint Protection Group Exam