A company has recruited a penetration tester to conduct a vulnerability scan over the network. The test is confirmed to be on a known environment. Which of the following would be the BEST option to identify a system properly prior to performing the assessment?
A. Asset inventory
B. DNS records
C. Web-application scan
D. Full scan
A. Asset inventory
B. DNS records
C. Web-application scan
D. Full scan