A cybersecurity analyst is tasked with identifying all external entry points into an organization's network, including vulnerable devices and interfaces exposed to the internet. What techniques would be most effective for this edge discovery process?
Arachni and internal network scanning
Nmap and external network scanning
Nikto and web vulnerability scanning
Burp Suite and web application testing