Zoe, an employee of a cybersecurity firm, conducts an audit for a third-party company. First of all, she plans to run a scanning that looks for common misconfigurations and outdated software versions. Which of the following tools is most likely to be used by Zoe?