PdfPrep.com

Which of the following BEST indicates that valid credentials were used?

A security auditor is reviewing vulnerability scan data provided by an internal security team.

Which of the following BEST indicates that valid credentials were used?
A . The scan results show open ports, protocols, and services exposed on the target host
B . The scan enumerated software versions of installed programs
C . The scan produced a list of vulnerabilities on the target host
D . The scan identified expired SSL certificates

Answer: B

Exit mobile version