Clara, an ethical hacker, is performing vulnerability assessment on an organization’s network. Instead of performing footprinting and network scanning, she used tools such as Nessus and Qualys for the assessment. Which of the following types of vulnerability assessment did Clara perform on the organization?