An organization wants to identify vulnerabilities that could be exploited by attackers from outside its network. Which method is MOST appropriate for achieving this goal?
External vulnerability scanning
Passive network monitoring
Internal vulnerability scanning
Penetration testing