Explanation A full inventory of all hardware and software would help ensure a security analyst is able to accurately measure the overall risk to an organization when a new vulnerability is disclosed, as it would allow the analyst to identify which systems and applications are affected by the vulnerability and prioritize the remediation efforts accordingly. A full inventory would also help the analyst to determine the impact and likelihood of a successful exploit, as well as the potential loss of confidentiality, integrity and availability of the data and services. References: * https://www.professormesser.com/security-plus/sy0-601/sy0-601-video/risk-analysis/ * https://resources.infosecinstitute.com/certification/security-plus-risk-management-processes-and-concepts/ * https://www.comptia.org/landing/securityplus/index.html * https://www.comptia.org/blog/complete-guide-to-risk-management