Watch this video on YouTube
Of the following, which uses known attacks and methodologies to verify that systems are properly hardened against known vulnerabilities and then produces a report for management regarding discovered weakness?