An organization needs to perform a network sweep to locate active hosts and open ports as part of their security assessment. Which is the BEST tool to accomplish this task?
|Operations and Incident Response
|Architecture and Design
|Governance, Risk, and Compliance
|Attacks, Threats, and Vulnerabilities