A security administrator begins assessing a network with software that checks for available exploits against a known database, using both credentials and external scripts. A report will be compiled and used to confirm patching levels.
This is an example of:
A . penetration testing
B . fuzzing
C . static code analysis
D . vulnerability scanning
Answer: D