A security analyst is preparing for a comprehensive vulnerability assessment of their organization's network. Which of the following should be performed FIRST to ensure that the assessment covers all networked devices?
Deploying intrusion prevention systems (IPS)
Reviewing regulatory compliance requirements for asset data
Creating a schedule for regular scanning intervals
Conducting map scans
|Incident Response and Management
|Reporting and Communication