Which of the following is an example of an activity that can be automated?(1 point)

Responses

security assessment

risk assessment

penetration testing

vulnerability scanning

vulnerability scanning