which of the following attack simulations detect vulnerabilities and attempt to exploit them? choose two. a. Pen testing. b. Red team–blue team exercise. c. Vulnerability assessment. d. Security audit.