A security professional collaborates with information technology teams to deploy an application that helps identify risks and vulnerabilities. What does this scenario describe?
- Upgrading network capacity
- Installing detection software
- Conducting a security audit
- Ethical hacking