Which of the following tools will scan a network to perform vulnerability checks and compliance auditing?
A security administrator notices that the log file of the company`s webserver contains suspicious entries: