Henry has been asked for vulnerability scan results by an incident responder. He is curious to know why the responder needs scan results. What answer would you provide to him to explain why scan results are needed and are useful?
A. The scans will show the programs the attackers used.
B. The scans will show the versions of software installed before the attack.
C. Vulnerable services will provide clues about what the attackers may have targeted.
D. The scans will show where firewalls and other network devices were in place to help with incident analysis.