The IT director asks you to determine if weak passwords are used by any of the users on your network. You run a password-cracking program to determine this. What is this an example of?
A. Antivirus scanning
B. Vulnerability assessment
C. Fingerprinting
D. Baselining
Answer: B. Vulnerability assessment