medium
Single Answer
0Which of the following methods typically provides the greatest insight into vulnerabilities that exist on systems owned by a company?
Answer Options
A
Penetration tests
B
Authenticated scans
C
Unauthenticated scans
D
Port scans
Correct Answer: B
Explanation
Authenticated scans can identify vulnerabilities that are not visible to unauthenticated scans. Penetration testers may not be able to obtain access equivalent to authenticated scans, so an authenticated scan is more likely to provide detailed data. Port scans do not provide deep vulnerability data.