When designing a vulnerability test, which one of the following is likely to give the BEST indication of what components currently operate on the network?
A. Ping testing
B. Mapping tools
C. Asset register
D. Topology diagrams
A. Ping testing
B. Mapping tools
C. Asset register
D. Topology diagrams