shaguftausman07 shaguftausman07 21-12-2022 Computers and Technology contestada Which of the following is used to replicate attacks during a vulnerability assessment by providing a structure of exploits and monitoring tools? a) replication image b) penetration framework c) assessment image d) exploitation framework