A ranked vulnerability worksheet is used to do what?
A) Prioritize vulnerabilities based on severity and potential impact
B) Identify and catalog security incidents
C) Create a timeline for vulnerability assessments
D) Assess the effectiveness of security controls