Identify the correct terminology that defines the above statement.
Vulnerability Scanning
Penetration Testing
Security Policy Implementation
Designing Network Security
Submit