medium
Single Answer
0

Which of the following methods typically provides the greatest insight into vulnerabilities that exist on systems owned by a company?

Answer Options

A

Penetration tests

B

Authenticated scans

C

Unauthenticated scans

D

Port scans

Correct Answer: B

Explanation

Authenticated scans can identify vulnerabilities that are not visible to unauthenticated scans. Penetration testers may not be able to obtain access equivalent to authenticated scans, so an authenticated scan is more likely to provide detailed data. Port scans do not provide deep vulnerability data.