Which of the following BEST indicates that valid credentials were used?

A security auditor is reviewing vulnerability scan data provided by an internal security team.

Which of the following BEST indicates that valid credentials were used?
A . The scan results show open ports, protocols, and services exposed on the target host
B . The scan enumerated software versions of installed programs
C . The scan produced a list of vulnerabilities on the target host
D . The scan identified expired SSL certificates

Answer: B

Latest SY0-601 Dumps Valid Version with 265 Q&As

Latest And Valid Q&A | 90 Days Free Update | Once Fail, Full Refund

Leave a Reply

Your email address will not be published. Required fields are marked *

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <s> <strike> <strong>