A vulnerability scan is being conducted against a desktop system. The scan is looking for files, versions, and registry values known to be associated with system vulnerabilities. Which of the following BEST describes the type of scan being performed?

A. Non-intrusive
B. Authenticated
C. Credentialed
D. Active

Answer: C. Credentialed

Computer Science & Information Technology

You might also like to view...

If the data you are using does not have the same amount of time between each data value, you should consider using a(n) ________ chart

Fill in the blank(s) with correct word

Computer Science & Information Technology

What is in the static route command that represents the default gateway?

a. default-gateway b. 0.0.0.0/0 c. set route d. None of the above

Computer Science & Information Technology