When performing a vulnerability assessment, many organizations use ____ software to search a system for any port vulnerabilities.
a. threat scanner
b. vulnerability profiler
c. port scanner
d. application profiler