You work as a Network Administrator for Tech Perfect Inc. You are required to verify security policies configured in the company's networks.
Which of the following applications will you use to accomplish the task?
Network enumerator
Port scanner
Web application security scanner
Computer worm
Submit