Which of the following is typically used by threat actors security analysts trying to determine the security posture of externally accessible assets?
Select the appropriate answer from below options:
a) Unauthorized scan
b) Authorized Scan
c) Inactive vulnerability scan
d) Active vulnerability scan