Appearance
A vulnerability scanner with an up-to-date vulnerability database is used for vulnerability scanning activities.