vanessad5063 vanessad5063 29-04-2024 Computers and Technology contestada Vulnerability scanners typically use behavior analysis, in which the scanner sends out requests to the target system and, upon receiving a response, analyzes the headers for the version details.a. availabilityb. javac. falsed. risk