ellamarie2287 ellamarie2287 09-05-2024 Computers and Technology contestada When performing a vulnerability assessment, many organizations use ____ software to search a system for any port vulnerabilities. a. threat scanner b. vulnerability profiler c. port scanner d. application profiler