Which of the following options refers to the process of discovering the weaknesses avallable in the network using some specialized tools? A. Vulnerability Scanning 8. Port Scanning C. Identity Assessment D. Cybersecurity vulnerabilitiesWhich one of the following options is used to allow hackers to view the network topology? A. Ping sweep B. HTTP Tunneling C. OpenVAS D. Network maps.