A technician has installed new vulnerability scanner software on a server that is joined to the company domain.
The vulnerability scanner is able to provide visibility over the patch posture of all company’s clients.
Which of the following is being used?
Gray box vulnerability testing
Bypassing security controls