You need to perform tests on your network to identify missing security controls. However, you want to have the least impact on systems that users are accessing. Which of the following tools is the best to meet this need?
A. Code review
B. Vulnerability scan
C. Ping sweep
D. Penetration test
Answer: B. Vulnerability scan