Briefly describe the difference between a configuration scan and a vulnerability scan. Identify two applications that are available to perform these scans.

Briefly describe the difference between a configuration scan and a vulnerability scan. Identify two applications that are available to perform these scans.