A security auditor is reviewing vulnerability scan data provided by an internal security team. Which ofthe following BEST indicates that valid credentials were used?
A、Thescanresultsshowopenports,protocols,andservicesexposedonthetargethost
B、Thescanenumeratedsoftwareversionsofinstalledprograms
C、Thescanproducedalistofvulnerabilitiesonthetargethost
D、ThescanidentifiedexpiredSSLcertificates
发布时间:2024-09-25 20:42:51