PapaBlessJr1882 PapaBlessJr1882 13-12-2022 English contestada Which of the following is used to replicate attacks during a vulnerability assessment by providing a structure of exploits and monitoring tools?