This document instructs the reader to choose a network scanning tool from the list in required reading slides, explain how it works to detect network vulnerabilities, and cite the source of information in a 350-word essay. The reader is to select a scanning tool, describe its functioning and vulnerability detection methods, and note where the details were found.