What are the objectives?a.) Map out vulnerabilitiesb.) Demonstrate that the vulnerabilities exist c.) Test the Incidence Responsed.) Actual exploitation of a vulnerability in a network, system, or application. Obtain privileged access, exploit buffer overflows, SQL injection attacks, etc. This level of test would carry out the exploitation of a weakness and can impact system availability.e.) All of the above