Watch this video on YouTube
Which of the following is the FIRST step in addressing vulnerable and outdated components on a network?