_________ is the process of scanning the network to find out which Internet Protocol (IP) addresses are attached to potentially vulnerable resources such as Web servers or database servers. Hardening Intrusive testing Host discovery Nonintrusive testing