Vulnerability scanners typically use behavior analysis, in which the scanner sends out requests to the target system and, upon receiving a response, analyzes the headers for the version details.
a. availability
b. java
c. false
d. risk