What Are the Uses for a Vulnerability Scanner?