Which of the following is used to replicate attacks during a vulnerability assessment by providing a structure of exploits and monitoring tools?

a) replication image

b) penetration framework

c) assessment image

d) exploitation framework