In a network with multiple client computers, servers, switches and wireless access points, what resources should be scanned for possible vulnerabilities.
Criteria:
1) roughly one page of information (max for free assignment)
2) sources of information