Which of the following best describes edge discovery in vulnerability management?
Scanning external web applications for vulnerabilities
Identifying and mapping network entry and exit points to understand the full attack surface
Regularly updating software to fix known security issues
Monitoring user activities within the internal network