Which of the following type of scanning utilizes automated process of proactively identifying vulnerabilities of the computing systems present on a network?