Notifications
Clear all
Topic starter
30/10/2022 9:31 am
A security auditor is reviewing vulnerability scan data provided by an internal security team.
Which of the following BEST indicates that valid credentials were used?
- A . The scan results show open ports, protocols, and services exposed on the target host
- B . The scan enumerated software versions of installed programs
- C . The scan produced a list of vulnerabilities on the target host
- D . The scan identified expired SSL certificates
Suggested Answer: B