A security auditor is reviewing vulnerability scan data provided by an internal security team.
Which of the following BEST indicates that valid credentials were used?
A . The scan results show open ports, protocols, and services exposed on the target host
B . The scan enumerated software versions of installed programs
C . The scan produced a list of vulnerabilities on the target host
D . The scan identified expired SSL certificates