Which of the following would be the best action to perform when conducting a corporate vulnerability assessment?Â A. Document scan results for the change control board. B. Organize data based on severity and asset value. C. Examine the vulnerability data using a network analyzer. D. Update antivirus signatures and apply patches.