Vulnerability scanners are automated tools that are used to identify vulnerabilities and misconfigurations of hosts. They also provide information regarding mitigating discovered vulnerabilities.
Which of the following statements is incorrect?
A . Vulnerability scanners attempt to identify vulnerabilities in the hosts scanned.
B . Vulnerability scanners can help identify out-of-date software versions, missing patches, or system upgrades
C . They can validate compliance with or deviations from the organization’s security policy
D . Vulnerability scanners can identify weakness and automatically fix and patch the vulnerabilities without user intervention