Which of the following BEST indicates that valid credentials were used?

Posted by: Pdfprep Category: SY0-601 Tags: , ,

A security auditor is reviewing vulnerability scan data provided by an internal security team.

Which of the following BEST indicates that valid credentials were used?
A . The scan results show open ports, protocols, and services exposed on the target host
B . The scan enumerated software versions of installed programs
C . The scan produced a list of vulnerabilities on the target host
D . The scan identified expired SSL certificates

Answer: B

Leave a Reply

Your email address will not be published.