Watch this video on YouTube
What type of vulnerability assessment involves sniffing the traffic on the network to identify the active systems, network services, applications, and vulnerabilities?