Which of the following best describes edge discovery in vulnerability management?
Monitoring user activities within the internal network
Identifying and mapping network entry and exit points to understand the full attack surface
Regularly updating software to fix known security issues
Scanning external web applications for vulnerabilities