A vulnerability scanner that uses its running service’s access level to better assess vulnerabilities across multiple assets within an organization is performing a:

A. Credentialed scan.
B. Non-intrusive scan.
C. Privilege escalation test.
D. Passive scan

Answer: A. Credentialed scan.

Computer Science & Information Technology

You might also like to view...

The Auto Arrange desktop option keeps desktop icons from being moved

Indicate whether the statement is true or false

Computer Science & Information Technology

The primary goal for a Web page author is to write well-formed documents that separate content from the way it appears in a user agent.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology