A security analyst has set up a
network tap to monitor network traffic for vulnerabilities. Which of the following techniques would BEST describe the approach the analyst has taken?
A. Compliance scanning
B. Credentialed scanning
C. Passive vulnerability scanning
D. Port scanning