A security analyst is reviewing the results of a vulnerability scan on the company's network. They notice that there is an unusual amount of activity on unexpected ports and a high processor consumption on some devices. Which of the following vulnerability scanning methods would be the most effective in further investigating these issues?
a. unselected Passive scanning
b. unselected Network-based scanning
c. unselected Host-based scanning
d. unselected Active scanning