momo621 momo621 12-12-2022 Computers and Technology contestada listen to exam instructions a security administrator logs onto a windows server on her organization's network. then she runs a vulnerability scan on that server. which type of scan was conducted in this scenario?