jahamilton9442 jahamilton9442 30-11-2022 Computers and Technology contestada during a vulnerability assessment, what type of software can be used to search a system for port vulnerabilities?