During what activity does an organization identify and prioritize technical, organizational, procedural,
administrative, and physical security weaknesses?
Table top exercise
Penetration testing
Vulnerability assessment
White box testing
Submit