When is it appropriate to use vulnerability scanners to identify any potential holes in your security design?
A. When testing disaster mitigation planning
B. When testing to identify known potential security risks inherent to your design
C. When testing the network's response to specific attacks
D. When testing the automatic detection and alerts of your network
Answer: B. When testing to identify known potential security risks inherent to your design