A company is trying to ascertain if a detected vulnerability is present in their system. Which of the following terms best describes this process?
A) Vulnerability scanning
B) Penetration testing
C) Risk assessment
D) Security audit