| Which of the following is typically used by threat actors security analysts trying to determine the security posture of externally accessible assets?
Choose the correct option from below list
(1)Unauthorized scan
(2)Authorized Scan
(3)Inactive vulnerability scan
(4)Active vulnerability scan
Answer:-(1)Unauthorized scan | | |