medium
Single Answer

What type of vulnerability scan accesses configuration information from the systems it is run against as well as information that can be accessed via services available via the network?

Answer Options

A

Authenticated scans

B

Web application scans

C

Unauthenticated scans

D

Port scans

Correct Answer: A

Explanation

Authenticated scans use a read-only account to access configuration files, allowing more accurate testing of vulnerabilities. Web application scans, unauthenticated scans, and port scans don't have access to configuration files unless they are inadvertently exposed.