Which role best describes the function of the protocol dedicated to automating the checking of security configurations, vulnerabilities, and policy compliance?
Enabling secure communications between different network entities
Logging and analyzing network traffic for potential security threats
Coordination and negotiation of network protocols for data transfer
Automated assessment, monitoring, and policy compliance evaluation