To maintain compliance with regulatory requirements, a security audit of the systems on a network must be performed to determine their compliance with security policies. Which one of the following tools would most likely be used in such an audit?
A. Protocol analyzer
B. Intrusion Detection System
C. Port scanner
D. Vulnerability scanner
A. Protocol analyzer
B. Intrusion Detection System
C. Port scanner
D. Vulnerability scanner