Jolene, a security analyst, is installing a vulnerability scanner that will receive updated information from vulnerability feeds that are published online. Which of the following might the product use?
A. API integration
B. Machine learning algorithms
C. Cryptographic protocols
D. Network sniffing techniques