Which of the following would be used to identify the security posture of a network without actually exploiting any weaknesses?

Which of the following would be used to identify the security posture of a network without actually exploiting any weaknesses?




A. Penetration test
B. Code review
C. Vulnerability scan
D. Brute Force scan


Answer: C


Learn More :