A security analyst has set up a network tap to monitor network traffic for vulnerabilities. Which of the following techniques would BEST describe the approach the analyst has taken?
a) Passive reconnaissance
b) Active reconnaissance
c) Vulnerability scanning
d) Penetration testing