The vulnerability assessment process typically includes which four activities? (Choose four.)