listen to exam instructions a security administrator logs onto a windows server on her organization's network. then she runs a vulnerability scan on that server. which type of scan was conducted in this scenario?