Which of the following best describes edge discovery in vulnerability management?
Identifying and mapping network entry and exit points to understand the full attack surface
Scanning external web applications for vulnerabilities
Regularly updating software to fix known security issues
Monitoring user activities within the internal network