Typically, Vulnerability Assessment involves the use of automated tools to identify vulnerabilities.