The vulnerability assessment process typically includes which four activities? (Choose four.)
A . device discovery
B . service enumeration
C . patching the software and firmware
D . reimaging the infected hosts
E . scanning
F . validation
Answer: ABEF