What are vulnerability scanners?
A. It is a tool that is designed to search the network to find open services running.
B. It is an automated process that periodically checks computers for known vulnerabilities.
C. It is a tool to execute known attacks on applications and to check if these applications are vulnerable to these types of attacks.
D. It is a tool that scans a knowledge database for vulnerabilities that may apply to an IT environment as a result of the type of systems available.