Answer:
Option (A) In the middle of a vulnerability assessment
Step-by-step explanation:
- Port Scanners are used to scan the ports available on a network and it tells the open ports on the network.
- A network administrator uses the port scanner to find the open ports available and to find the vulnerabilities on them.
- Open ports are vulnerable to the attacks. So, they must be taken care.
- Vulnerability Assessment is the process of finding the vulnerabilities in the network system. It involves many steps.
- The first step in the vulnerability assessment is to find the target system. So, option (B) is false.
- Option (A) is true. After finding and understanding the system by the network administrator, there is a need for port scanner to find the open ports.
- Option (C) is false. It is not used when to DOCUMENT the vulnerabilities. Even before going to the documentation stage, a network administrator has to know which ports are vulnerable.
- A port scanner is used in the middle of the vulnerability assessment in order to find the open ports on the system as they are the most vulnerable.
- Option (D) is false. Penetration testing involves the usage of port scanner much before the ending. In fact the pen testing process involves the port scanner at the beginning of the pen testing to find the open ports.