To maintain compliance with regulatory requirements, a security audit of the systems on a network must be
performed to determine their compliance with security policies. Which one of the following tools would most
likely be used in such an audit?
A.
Vulnerability scanner
B.
Protocol analyzer
C.
Port scanner
D.
Intrusion Detection System
Explanation:
A vulnerability scanner is a computer program designed to assess computers, computer systems, networks or
applications for weaknesses.
They can be run either as part of vulnerability management by those tasked with protecting systems – or by
black hat attackers looking to gain unauthorized access.
https://en.wikipedia.org/wiki/Vulnerability_scanner