The assessment that evaluates a system's security and ability to meet compliance requirements based on its configuration state and information collected from the system is a **Vulnerability assessment**.
A vulnerability assessment focuses on identifying, quantifying, and prioritizing vulnerabilities in a system, providing a basis for remediation efforts and compliance verification.


