A threat intelligence feed has posted an alert stating there is a critical vulnerability in the kernel. Unfortunately, the company’s asset inventory is not current. Which of the following techniques would a cybersecurity analyst perform to find all affected servers within an organization?
 A. A manual log review from data sent to syslog
 B. An OS fingerprinting scan across all hosts
 C. A packet capture of data traversing the server network
 D. A service discovery scan on the network
