Which of the following tools would a security administrator use in order to identify all running services throughout an organization?
Which of the following would verify that a threat does exist and security controls can easily be bypassed without actively testing an application?