Which of the following best describes the primary use of Nmap in the context of vulnerability management?
Cracking passwords on networked devices
Serving as an antivirus to remove malware from a network
Encrypting data in transit across the network
Discovering devices and services on a network