A cybersecurity analyst is tasked with conducting a vulnerability scan to identify weaknesses that an attacker could exploit from outside the network. Which of the following types of scans is BEST suited to meet this specific requirement?
Utilizing a scan with device fingerprinting capabilities from the demilitarized zone (DMZ)
Performing an external scan
Conducting a scan utilizing internal IP addresses
Running a scan from the organization's internal network