While planning a vulnerability assessment on a computer network, which of the following is essential? (Choose two.)
Identifying exposures
Identifying critical assets
Establishing scope
Running scanning tools
Installing antivirus software
Submit