Craig received a report of all the computers on the network that showed all the missing patches and weak passwords. What type of software generated this report?
A. a port scanner
B. a vulnerability scanner
C. a virus scanner
D. a malware scanner
A. a port scanner
B. a vulnerability scanner
C. a virus scanner
D. a malware scanner