slebron530 slebron530 29-02-2024 Computers and Technology contestada A company is trying to ascertain if a detected vulnerability is present in their system. Which of the following terms best describes this process? A) Vulnerability scanning B) Penetration testing C) Risk assessment D) Security audit