After analyzing vulnerability and applying a security patch, which non-intrusive action should be
taken to verify that the vulnerability was truly removed?
A.
Update the antivirus definition file.
B.
Apply a security patch from the vendor.
C.
Repeat the vulnerability scan.
D.
Perform a penetration test.