A vulnerability scanner that uses its running service’s access level to better assess vulnerabilities across multiple assets within an organization is performing a:
A. Credentialed scan.
B. Non-intrusive scan.
C. Privilege escalation test.
D. Passive scan
Answer: A. Credentialed scan.
Computer Science & Information Technology
You might also like to view...
The Auto Arrange desktop option keeps desktop icons from being moved
Indicate whether the statement is true or false
Computer Science & Information Technology
The primary goal for a Web page author is to write well-formed documents that separate content from the way it appears in a user agent.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology