Question 444:
A security analyst is reviewing an assessment report that includes software versions, running services, supported encryption algorithms, and permission settings. Which of the following produced the report?
Answer options:
A. Vulnerability scanner B. Protocol analyzer C. Network mapper D. Web inspector