Which of the following would be used to identify the security posture of a network without actually exploiting any weaknesses? SY0-401 Which of the following would be used to identify the security posture of a network without actually exploiting any weaknesses? A. Penetration test B. Code review C. Vulnerability scan D. Brute Force scan Answer: C Learn More : Share this Share on FacebookTweet on TwitterPlus on Google+