Vulnerability scanners are automated tools that are used to identify vulnerabilities and misconfigurations of hosts. They also provide information regarding mitigating discovered vulnerabilities.
Which of the following statements is incorrect?
A.
Vulnerability scanners attempt to identify vulnerabilities in the hosts scanned.
B.
Vulnerability scanners can help identify out-of-date software versions, missing patches, or system upgrades
C.
They can validate compliance with or deviations from the organization’s security policy
D.
Vulnerability scanners can identify weakness and automatically fix and patch the vulnerabilities without user intervention