Which of the following would be used to identify the security posture of a network without actually exploiting any weaknesses?
A. Penetration test
B. Code review
C. Vulnerability scan
D. Brute Force scan
Answer: C
Quiz, Objective, Multiple Choice Question (MCQ), Test Bank Solution and Short Answers.