Scanning
When there is a doubt that mitigating controls, such as firewalls, intrusion-detection systems, and file-integrity monitoring, a full penetration test is ideal. Scanning will locate individual vulnerabilities; however, penetration testing will attempt to verify that these vulnerabilities are exploitable within the target environment. Let's have a look into each of the types.