Which of the following business challenges could be solved by using a vulnerability scanner?
A.
Auditors want to discover if all systems are following a standard naming convention.
B.
A web server was compromised and management needs to know if any further systems were
compromised.
C.
There is an emergency need to remove administrator access from multiple machines for an employee that
quit.
D.
There is a monthly requirement to test corporate compliance with host application usage and security
policies.