header bg

Question:

Such as open ports, access points, and other potential threats, to find system weaknesses, what type of scan is used?

A Vulnerability scan
Explaination