A penetration testing is preparing for a client engagement in which the tester must provide data that proves and
validates the scanning tools’ results. Which of the following is the best method for collecting this information?
Set up the scanning system’s firewall to permit and log all outbound connections
Use a protocol analyzer to log all pertinent network traffic
Configure network flow data logging on all scanning system
Enable debug level logging on the scanning system and all scanning tools used.